I am developing a new exploit chain for the ESP8266 #1171
jeremysalwen
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
The ESP8266 can be vulnerable to the lighleak/cloudcutter exploit. However, the callback pointer which those exploits use is not available to exploit on the ESP8266 in the version I looked at. Instead, the issue appears as a heap buffer overflow. Unfortunately there are a few integrity checks in the allocator used, so we are quite restricted in what we can do with it. However, we are able to write zero words to any address in memory.
I think it might be possible to use this primitive to overwrite the keys with zero bytes, and then use tuya convert for the final stage. However, I am not so familiar with the PSK code on the ESP8266, and I thought someone from this project might know:
p.s.
The full details of the primitive are as follows:
For any 4 byte region of memory, if the second byte is greater than about ~24, I can
I think I could repeat this primitive to zero out a region of memory.
Beta Was this translation helpful? Give feedback.
All reactions