Firmware-level security is no longer optional

x32x01
  • by x32x01 ||
This is not my discovery - but it’s one that needs to be shared.
🔍 Cybersecurity researcher Juan Sacco (jsacco@exploitpack.com) uncovered a serious security flaw while reversing the firmware of Dell RT (Radyum device).
📌 Issue #1: Passwords were found hardcoded inside the binary - an open invitation for reverse engineering.
📌 Issue #2: A privilege escalation vulnerability was found due to improper use of the .NET Profiler.
By loading a malicious DLL, an attacker could escalate privileges to SYSTEM and hijack the app’s control flow.

🔒 Vulnerability Summary:
• Device: RAD FT Firmware version A00-00 Build (WP0000051154) and prior
• Technique: DLL Injection via .NET Profiler
• Researcher: Juan Sacco
• Reported via: BugCrowd
• Source: https://exploitpack.com
🔐 Firmware-level security is no longer optional - it’s a baseline.
2022.jpg
 
Last edited:

Related Threads

x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
486
x32x01
x32x01
x32x01
Replies
0
Views
543
x32x01
x32x01
x32x01
Replies
0
Views
476
x32x01
x32x01
TAGs: Tags
.net profiler abuse cybersecurity disclosure dell rt vulnerability dll injection embedded device security firmware reverse engineering firmware security hardcoded credentials iot security risk privilege escalation
Register & Login Faster
Forgot your password?

Latest Resources

Forum Statistics
Threads
745
Messages
750
Members
71
Latest Member
Mariaunmax
Back
Top