An malicious BLE device can crash BLE victim device by sending malformed gatt packet
Weakness
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
References