If an attacker can covertly pair their seeker with vulnerable headphones or earbuds, they could obtain complete control over it, including tampering with controls such as volume. More importantly, ...