### [CVE-2012-3725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3725) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The DNAv4 protocol implementation in the DHCP component in Apple iOS before 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote attackers to obtain sensitive information about previous device locations by sniffing an unencrypted Wi-Fi network for these packets. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Apptifyme/isniff - https://github.com/PleXone2019/Sniff-GPS - https://github.com/hubert3/iSniff-GPS - https://github.com/vflanker/AppleSniffer-GPS