https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader
This is a one-time signature verification bypass. For persistent signature verification bypass, check https://github.com/TomKing062/CVE-2022-38691_38692
https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader
spreadtrum unisoc
Last synced: 3 months ago
JSON representation
This is a one-time signature verification bypass. For persistent signature verification bypass, check https://github.com/TomKing062/CVE-2022-38691_38692
- Host: GitHub
- URL: https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader
- Owner: TomKing062
- Created: 2023-06-10T08:31:26.000Z (almost 2 years ago)
- Default Branch: info
- Last Pushed: 2025-02-21T14:10:58.000Z (3 months ago)
- Last Synced: 2025-02-21T15:23:54.944Z (3 months ago)
- Topics: spreadtrum, unisoc
- Language: C
- Homepage:
- Size: 1.08 MB
- Stars: 337
- Watchers: 8
- Forks: 49
- Open Issues: 11
-
Metadata Files:
- Readme: readme.md
Awesome Lists containing this project
README
# CVE-2022-38694
An attacker with physical access to the device can overwrite a function pointer somewhere in the BootROM data section or a return address stored on the stack and execute their own code with BootROM privileges.
For detailed information, read [the article by NCC Group](https://research.nccgroup.com/2022/09/02/theres-another-hole-in-your-soc-unisoc-rom-vulnerabilities/).
## 快速指路:
工具下载:[Releases](https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/releases)
使用方法:[Wiki](https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/wiki)
## How to unlock bootloader with CVE-2022-38694
Download: [Releases](https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/releases)
Usage: [Wiki](https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/wiki)