Raxone / Amlogic-exploit

Amogic exploit in linux level
5 stars 1 forks source link
amlogic bl31 bootrom efuse exploit s905x2 s905x3

BL31 Exploit of the Amlogic s905x2, s905x3 and s922x SOCs

This is a modification of Blasty's exploit, made to work the Amlogic s905x2, s905x3 and s922x(Thanks Taco) SOCs.

Added a memory dumping function (dump_mem) to read RAM & SRAM.

The compiled Lkm_module is compatible with CoreELEC versions 19.5,20.2 and 21, Linux/arm64 4.9.269 kernel configuration.

All source has been compiled and is ready to use.

How to use

CoreELEC (version 19.5-21) needs to be booted on the target device to run the exploit.

Use CoreELEC's default smb server to copy & paste the exploit files to the target.

Transfer aml_pwn, khax.ko and load_lkm.sh to the Downloads folder of CoreELEC.

To run the exploit establish an ssh or uart connection with the Amlogic box.

SSH Example

ssh root@ip_addr_box (ssh root@192.168.x.x) default password for ssh is "coreelec"

Compilation resources

*GCC for aml_pwn

*GCC for lkm

*Linux/arm64 4.9.269 Kernel Configuration

Video Demo

YouTube * https://youtu.be/i1MrdO4PWYw