Skip to Content

Latest iOS 14.7 Beta Patches Bug That Disables iPhone's Ability to Connect to Wi-Fi

The latest beta for iOS and iPadOS 14.7, released to developers this week, patches a bug that disabled an iPhone's ability to connect to Wi-Fi if a user connected to a specific Wi-Fi network with the name "%p%s%s%s%s%n."

ios wifi settings
In his latest video rounding up the latest changes in the beta, YouTuber Zollotech found that the update has silently patched the bug that caused an iPhone to become unable to connect to Wi-Fi networks.

The bug was discovered on Twitter last month and consisted of an ‌iPhone‌ connecting to a Wi-Fi SSID with the name "%p%s%s%s%s%n." According to user reports, doing so would "permanently disable" an ‌iPhone‌'s Wi-Fi functionality, making the bug rather dangerous.

While some have claimed the bug "permanently" disabled their ‌iPhone‌'s Wi-Fi, other users found that resetting their network settings after connecting to the network restored Wi-Fi for the ‌iPhone‌.

Apple has been testing iOS and iPadOS 14.7 with developers and public beta testers for the past few weeks. Apple can be expected to publicly release the update soon, given the crucial bug fix that it provides to ‌iPhone‌ user.

Last month, Apple previewed iOS 15, the next major update to iOS destined for a public launch this fall. The upcoming update to iOS 14 will likely be the last major update to the operating system ahead of iOS 15's fall release.

Popular Stories

iphone fold text

iPhone Fold Crease Measurements Revealed as Device Hits Production

Wednesday February 25, 2026 5:37 am PST by
Apple has submitted production line orders for its upcoming foldable iPhone, effectively confirming that the device will launch this year, claims a Chinese leaker. According to the Weibo account "Fixed Focus Digital," assembly lines recently received the orders from Apple, which has apparently allowed the leaker to learn the crease measurements for the device's 7.8-inch inner display....
Low Cost A18 Pro MacBook Feature Pink

Leaker Says Apple's Lower-Cost MacBook Will Have These 8 Limitations

Wednesday February 25, 2026 9:25 am PST by
Apple is expected to unveil its long-rumored lower-cost MacBook next week. Given it will be more affordable, this MacBook model will obviously have some reduced specs and compromises compared to the MacBook Air and MacBook Pro. While we are still waiting for Apple to announce the new MacBook, a leaker has shared eight alleged limitations to expect, based on an internal version of Apple's...
m3 macbook pro blue

M5 Pro and M5 Max MacBook Pro: What to Expect

Wednesday February 25, 2026 3:02 pm PST by
Apple is working on a new MacBook Pro that could launch next week ahead of the "Special Experience" planned for March 4, so we thought we'd highlight all of the rumors about the device so far. Design There are no rumors of design changes, and we are expecting the upcoming M5 MacBook Pro models to look just like the M4 versions. Apple will continue to offer 14-inch and 16-inch size options,...

Top Rated Comments

CarlJ Avatar
61 months ago
Sigh. Never use data from external sources without sanitizing it first, and never hand arbitrary data to printf and friends as a template string - sure, it'll work most of the time... but then this.

This is not esoteric guru stuff, it's programming 101 (okay, maybe 201).
Score: 7 Votes (Like | Disagree)
DeepIn2U Avatar
61 months ago

COVID will never truly go away, just getting controlled. Just saying.

As for “dangerous”, if a mere resetting network setting could fix it, then it is not so “dangerous”. Inconvenient sure but “dangerous” is slightly over the board.
https://www.forbes.com/sites/gordonkelly/2021/07/06/apple-iphone-wifi-security-hack-ios-iphone-upgrade/?sh=4351967e2b86


The Increased Damage

The first development came via Carl Shou, the reverse engineer who initially discovered the hack ('https://www.forbes.com/sites/gordonkelly/2021/06/20/apple-iphone-warning-wifi-vulnerability-exploit-new-iphone-problem/'). Shou found that joining WiFi networks with specific symbols in their name (SSID) could disable any iPhone’s WiFi until the phone’s network settings were reset. Shou has subsequently managed to increase the damage this hack does ('https://twitter.com/vm_call/status/1411630091038203909'), with WiFi only being restored from a custom factory reset where the iPhone backup file is manually edited to remove malicious entries ('https://twitter.com/vm_call/status/1411753482437148683').


Fears had already been expressed ('https://www.forbes.com/sites/gordonkelly/2021/07/03/apple-iphone-security-warning-airborne-attack-threat-new-iphone-exploit/') that this hack - known as a format string flaw - could be amplified. The end game being to use it to inject and execute malicious code onto devices and even whole networks.

The Hidden Threat

The flip side to this escalating threat, was that iPhone owners would have to join a strangely named WiFi network to be hacked. But the second development suggests this may no longer be the case.
originally reported from above link:

https://www.forbes.com/sites/gordonkelly/2021/07/03/apple-iphone-security-warning-airborne-attack-threat-new-iphone-exploit/?sh=820e3d454ae9


Following revelations last month that all iPhones are vulnerable to a simple WiFi hack ('https://www.forbes.com/sites/gordonkelly/2021/06/20/apple-iphone-warning-wifi-vulnerability-exploit-new-iphone-problem/'), new research ('https://www.aireye.tech/post/the-apple-format-string-bug-from-a-silly-prank-to-an-airborne-attack') from Amichai Shulman, CTO of wireless security specialist AirEye, has claimed this type of threat is potentially more dangerous than was first reported and can also spread to macOS.


“Our response research on the format string flaw revealed that the vulnerability is not only restricted to the iOS operating system,” states Shulman. “It also has the potential to affect the macOS operating system used by many corporations for employee stations.”


“The nature of format string vulnerabilities is that when carefully crafted they can be used to write arbitrary code into random, or chosen, parts of a machine’s memory - and even eventually inject and execute code,” Shulman explains. “Since it is possible for the vulnerable iOS and macOS devices to be connected to the larger corporate network, this code can eventually be used for lateral movement even if it only stemmed from an employee accidentally joining an unknown SSID. Once the malicious code has infiltrated a device on the network, it can exploit corporate data without the need to ‘access the network first’ in the typical ways.”
I'd say it's dangerous enough for Apple to consider it important to patch.
Score: 2 Votes (Like | Disagree)
TheYayAreaLiving 🎗️ Avatar
61 months ago
Hopefully it’s out in public next week.
Score: 2 Votes (Like | Disagree)
61 months ago
Saved! I really don't know how I have survived with that bug in 14.6.

Yes - I do realise some people might really have a problem but I suspect the other things in 14.7 are likely far more important to the majority.
Score: 2 Votes (Like | Disagree)
Apple_Robert Avatar
61 months ago

My setting will ASK if I want to join any unknown WIFI, so in theory, My phone should be save from this big … yes?
As long the phone prompts for a reply and you don't mess up the reply, you should be fine. The chances of you coming across a public WiFi name that messes up your phone is less than a percent, in my opinion.
Score: 2 Votes (Like | Disagree)
Shirasaki Avatar
61 months ago

No this is actually quite important! Glad Apple coding team has made fast work of this - considering more and more of us are now fully able to explore our communities and world again. buy-bye pandemic.
COVID will never truly go away, just getting controlled. Just saying.

As for “dangerous”, if a mere resetting network setting could fix it, then it is not so “dangerous”. Inconvenient sure but “dangerous” is slightly over the board.
Score: 2 Votes (Like | Disagree)