This repository contains a modified version of Blasty's exploit for the Amlogic A113X SoC, adapted to work with the Amlogic S905X2, S905X3, and S922X SoCs. Thanks to Taco for the assistance in modifying the original exploit.
dump_mem
function to read from RAM and SRAMNote: This module does not work with CoreELEC versions 20.3 or 20.4.
Downloads
folder of CoreELEC:
aml_pwn
khax.ko
load_lkm.sh
ssh root@<ip_address_of_device> # Example: ssh root@192.168.x.x
Default SSH password:
coreelec
./load_lkm.sh
aml_pwn
to dump different parts of the system memory:
./aml_pwn dump_bootrom bootrom.bin
./aml_pwn dump_otp otp.bin
./aml_pwn dump_mem 0x800 0xfffe0000 efuse.bin
./aml_pwn dump_mem 0x10000 0xfffa0000 bl2.bin
To compile the necessary tools and kernel modules, follow these steps:
aml_pwn
Download and install the GCC toolchain:
khax.ko
)Install GCC for AArch64 cross-compilation:
sudo apt install gcc-aarch64-linux-gnu
Use the Linux/arm64 kernel 4.9.269 configuration for compilation:
Watch a demo of the exploit in action on YouTube:
This project is licensed under the MIT License – see the LICENSE file for details.