An attacker can gain man-in-the-middle access to inject a rogue executable file onto the phone.
Source: Threadpost