Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
Where the Latest Log4Shell Attacks Are Coming From
-
Analysts find at least 10 Linux botnets actively exploiting Log4Shell flaw.
https://threatpost.com/log4shell-attacks-origin-botnet/176977/