| free hax | https://haxx.in/ |
| free hax | https://haxx.in/ |
In this post we will exploit a memory corruption issue in AMLogic El3 code that is used by various consumer devices like the Sonos One (2nd generation) and the Lenovo Smart Clock. The goal is to get a copy of the OTP/eFUSE data and dump out the code for the application processor BootROM.
Finally put together a full writeup about wInd3x, the iPod Nano 5G bootrom vulnerability I discovered and exploited last year:
Got quite a few questions about the post-exploitation payload for the printer(s), here is the code: https://github.com/blasty/printer-cracktro
It even runs in the browser thanks to the power of Emscripten/WASM: https://haxx.in/files/canon_wasm.html