An open API service indexing awesome lists of open source software.

https://github.com/davidbuchanan314/wampage

WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)
https://github.com/davidbuchanan314/wampage

arm cve-2022-23731 exploit javascript lg-webos lg-webos-tv lpe python v8 webos webos-tv

Last synced: 10 days ago
JSON representation

WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)

Awesome Lists containing this project

README

        

# WAMpage
WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)

This exploit is mainly of interest to other researchers - if you just want to root your TV, you probably want [RootMyTV](https://github.com/RootMyTV/RootMyTV.github.io), which offers a reliable 1-click persistent root.

Currently only supports WebOS 4.x on 32-bit SoCs. This software is provided AS IS, use at your own risk, etc. etc.

Writeup: https://www.da.vidbuchanan.co.uk/blog/webos-wampage.html

![image](https://user-images.githubusercontent.com/13520633/147524216-c9fab6cd-6841-42ab-96b4-b7dd91ff0b23.png)

## Building

Prerequesites:

```bash
apt install qemu-user
npm install -g @webosose/ares-cli
```

Compiling:

```bash
make
```

## Testing Locally

`make test` will build and run the exploit in `d8`, running in `qemu-arm`. (A pre-compiled version of d8 and its dependencies are included in the `bin/` directory). If the exploit works succesfully, you'll probably get something like this:

```
[+] Starting WAMpage...
[+] addrof(myobj) = 0x5a68f5d1
[+] Test: reconstructed myobj: {"foo":"bar"}
[+] Set up arbread32/arbwrite32.
[+] stage2 shellcode loaded @ 0xff458000
[+] myfunc @ 0x5a693369
[+] stage1 RWX buf @ 0x5bb8f280
[+] Copied stage1 shellcode. Calling...
Traceback (most recent call last):
File "", line 25, in
IOError: [Errno 13] Permission denied: '/dev/mem'
```

The permission error is expected, assuming your machine isn't totally misconfigured.

You can test the `devmemes.py` exploit by running it directly on a TV, but you'll either need root to begin with, or some other kind of unsandboxed/unjailed shell.

## Installation on TV

You can use `ares-install`, or manually copy over the IPK and run this from the devmode shell:

```bash
luna-send-pub -i 'luna://com.webos.appInstallService/dev/install' '{"id":"tv.rootmy.wampage","ipkUrl":"/path/to/wampage.ipk","subscribe":true}'
```

## Running on TV

Launch the app and press the "Start Exploit" button. If all goes well, a telnet server should open up on port 31337.