|
You are here |
voidstarsec.com | ||
| | | | |
www.sixfoisneuf.fr
|
|
| | | | | ||
| | | | |
gist.github.com
|
|
| | | | | Work-in-progress U-Boot bootloader (still linked with the libdram blob) booting 32-bit Linux kernel on Pine64+ board - gist:67ebb38e8f8f2b9b5ee6 | |
| | | | |
axelp.io
|
|
| | | | | [AI summary] The provided text details a reverse-engineering and security analysis of a projector's firmware, leading to the discovery of a potential remote code execution (RCE) vulnerability. The author explored the firmware's CGI scripts and libraries, identified a command injection vulnerability in the `connect_network` function, and found that it could be exploited by sending a crafted HTTP request. However, the author's findings could not be validated due to the product being end-of-life (EOL), and the vulnerability may not be exploitable on newer devices due to hardware differences. | |
| | | | |
www.paedubucher.ch
|
|
| | | Personal Website of Patrick Bucher (paedubucher), mostly about IT-related topics (programming) | ||