Click any tag below to further narrow down your results
Links
The article details the discovery of a stack overflow vulnerability in the PS VR2's USB authentication process, allowing users to downgrade firmware. By exploiting this flaw, users can access older, more vulnerable firmware versions for potential modifications. The author shares their research process and the eventual implementation of the exploit.
This article details the process of finding and exploiting a vulnerability in the IN-8401 2K+ IP camera. The author describes steps from firmware extraction to building an ARM ROP chain for unauthenticated remote code execution. It highlights the importance of proper debugging and analysis methods in discovering security flaws.
Researchers from Binarly have discovered a method to bypass a patch for a Supermicro vulnerability that allows malicious firmware updates via the Baseboard Management Controller (BMC). This vulnerability poses a significant risk to enterprise organizations, offering attackers persistent control over the BMC and the main operating system.