Skip to content

Instantly share code, notes, and snippets.

@tanprathan
Created January 11, 2023 04:02
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tanprathan/69fbf6fbac11988e12f44069ec5b18ea to your computer and use it in GitHub Desktop.
Save tanprathan/69fbf6fbac11988e12f44069ec5b18ea to your computer and use it in GitHub Desktop.
OKER UART
> [Description]
>> OS Command Injection vulnerability in OKER G955V1 v1.03.02.20161128,
>> allows physical attackers to interrupt the boot sequence and execute
>> arbitrary commands with root privileges.
---------------------------------------------------------------
> [Vulnerability Type]
>> Incorrect Access Control
---------------------------------------------------------------
> [Additional Information]
>> Proof of Concept:
>> https://www.dropbox.com/s/cnzwbxhxl0ahzoa/OKER_UART_2.mp4
---------------------------------------------------------------
> [Affected Component]
>> UART Hardware
---------------------------------------------------------------
> [Attack Type]
>> Physical
---------------------------------------------------------------
> [Impact Code execution]
>> true
---------------------------------------------------------------
> [Attack Vectors]
>> The attacker with physical access is able to access the
>> device console with root privilege via UART hardware. Once
>> the UART channel (Tx, Rx, GND) is identified, the attacker
>> will be able to access the device console, interrupt the
>> boot sequence and gain access to the console with root
>> privilege lead to information disclosure, arbitrary code
>> execution, backdoor planting on the device to conduct
>> further attack (e.g. Data infiltration and exfiltration on
>> internal network)
---------------------------------------------------------------
> [Has vendor confirmed]
>> true
---------------------------------------------------------------
> [Discoverer]
>> Prathan Phongthiproek
---------------------------------------------------------------
> [Reference]
>> http://www.okerthai.com
>> https://www.dropbox.com/s/cnzwbxhxl0ahzoa/OKER_UART_2.mp4
---------------------------------------------------------------
> [Vendor of Product]
>> OKER
---------------------------------------------------------------
> [Affected Product Code Base]
>> G955V1 v1.03.02.20161128
---------------------------------------------------------------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment