QUOTE(Anime4000 @ Jul 24 2024, 12:36 PM)
I have ARM64 build root, all sus binary replaced with "int main::return 0;" as you mention it, luckily it still boot but usable not tried yet.
all the rucks happen lately, I stop Reverse Engineering on this D-Link DPN series, and remove the firmware download links
I have been told in discord discussion that D-Link DPN-FX3060V has vulnerable, they still didn't tell me how to exploit it, as for this I now didn't care to nuke sus IoT binary out of D-Link, just let them hack the D-Link
I reverse engineer ccom_linkkit.all the rucks happen lately, I stop Reverse Engineering on this D-Link DPN series, and remove the firmware download links
I have been told in discord discussion that D-Link DPN-FX3060V has vulnerable, they still didn't tell me how to exploit it, as for this I now didn't care to nuke sus IoT binary out of D-Link, just let them hack the D-Link
It is basically built on top of AliOS Things, which can be found here:
https://github.com/alibaba/AliOS-Things
The vulnerabilities seems to be many of the components are old and never updated.
After looking at some of the CVE, potentially exploitable in the real world are:
CVE-2024-2466
CVE-2024-23775
CVE-2024-6197
I am limiting my CVE search to within these 2 years based on the state of AliOS Things repo.
No doubt there are other known CVE but I feel they are a bit "hard" to exploit.
If I am the attacker I would just focus on the above CVEs.
I only check for curl, cjson and mbedtls. I did not go look at the other long list of components.
This is really some intense time consuming work.
As for boa, I let this article do the talking:
https://www.theregister.com/2022/11/23/micr...boa_web_server/
This post has been edited by kwss: Jul 27 2024, 07:38 AM
Jul 27 2024, 07:01 AM

Quote
0.0184sec
0.34
6 queries
GZIP Disabled