Difference between revisions of "Asus Cube"
m (Text replacement - "gtvcom-20" to "exploiteers-20") |
|||
(6 intermediate revisions by 4 users not shown) | |||
Line 8: | Line 8: | ||
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV. | Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV. | ||
[http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&tag= | [http://www.amazon.com/gp/product/B00CBYYKKY/ref=as_li_ss_tl?ie=UTF8&tag=exploiteers-20&linkCode=as2&camp=1789&creative=390957&creativeASIN=B00AM0ESC4 Purchase the Asus Cube at Amazon] | ||
== Specs == | == Specs == | ||
Line 21: | Line 21: | ||
== Cuberoot == | == Cuberoot == | ||
[[File:Cuberoot.png|200px|right|thumb]] | [[File:Cuberoot.png|200px|right|thumb]] | ||
Cuberoot was released May 17, 2013 for the Asus Cube by the | Cuberoot was released May 17, 2013 for the Asus Cube by the Exploitee.rs team. This root leverages a local command execution vulnerability within a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution. | ||
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons. | This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons. | ||
Line 33: | Line 33: | ||
*Allow you to patch this vulnerability, which prevents malicious applications from using this bug. | *Allow you to patch this vulnerability, which prevents malicious applications from using this bug. | ||
Download [http:/ | Download [http://download.Exploitee.rs/file/asus/Cuberoot.apk Here] | ||
== Gallery == | == Gallery == | ||
Line 62: | Line 62: | ||
*MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the "Asus Qube" | *MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the "Asus Qube" | ||
*MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as "Cube", adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download] | *MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as "Cube", adds Voice Search and additional apps [http://android.clients.google.com/packages/ota/asus_buddybox/145f690316be.asus_google_cube-ota-20130327.110723.zip Download] | ||
*MASTER.20130523.021406 - Second OTA (05/23/2013). Adds Amazon instant video [http://android.clients.google.com/packages/ota/asus_buddybox/820fef142e1d.asus_google_cube-ota-20130523.021406.zip Download] | |||
*MASTER.20131023.164739 - Adds VUDU support [http://android.clients.google.com/packages/ota/asus_buddybox/f709b679f477da791897a72af199eea9fe604f70.asus_google_cube-ota-20131023.180530.zip Download] | |||
== Connections / Connectors / Switches == | == Connections / Connectors / Switches == | ||
Line 70: | Line 72: | ||
*WIFI_CON - WiFi / BT Antenna Board (SDIO) | *WIFI_CON - WiFi / BT Antenna Board (SDIO) | ||
*SW1 - Factory Reset | *SW1 - Factory Reset | ||
==Links== | |||
* [http://promos.asus.com/US/asuscube/ Official Web Site] | |||
[[Category:Google TV]] |
Latest revision as of 01:22, 7 February 2016
"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."
This page will be dedicated to the hardware specifications, descriptions, and information related to the Asus Cube (Formerly Qube).
Purchase
Buying Google TV devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next Google TV.
Purchase the Asus Cube at Amazon
Specs
These specifications are unverified, but based off of the SOC this should hold to be "trueish". We will update this once the hardware ships.
- Marvell Armada 1500(88DE3100) 1.2 GHz dual-core processor, with a 750 MHz GPU
- 1 GB DDR3 Memory
- 4 GB Flash NAND
- Two USB Ports
- IR Blaster
Cuberoot
Cuberoot was released May 17, 2013 for the Asus Cube by the Exploitee.rs team. This root leverages a local command execution vulnerability within a Unix socket for NFS mounting. This socket interfaces with a helper application that doesn’t properly sanitize input allowing local code execution.
This particular vulnerability is made better by being able to be exploited from within an Android app, and allows us to provide users with an easy method of patching their device to prevent another application from exploiting the bug for nefarious reasons.
Cuberoot will:
- Root your Asus Cube.
- Install SuperSu.
- Modify the Flash Player to bypass website blocks on streaming media sites.
- Disable automatic updates.
- Collect anonymous statistical information about your device.
- Allow you to patch this vulnerability, which prevents malicious applications from using this bug.
Download Here
Gallery
Update History
- MASTER.20130115.133219 (01/15/2013) - Launch version, shipped on the box. Box is branded as the "Asus Qube"
- MASTER.20130327.094230 - First OTA (04/24/2013). Rebrands the box as "Cube", adds Voice Search and additional apps Download
- MASTER.20130523.021406 - Second OTA (05/23/2013). Adds Amazon instant video Download
- MASTER.20131023.164739 - Adds VUDU support Download
Connections / Connectors / Switches
- J2 - SPI ?
- UART1 - UART (115200 8n1)
- UART2
- RF_CON - Remote Control Antenna Board
- WIFI_CON - WiFi / BT Antenna Board (SDIO)
- SW1 - Factory Reset