- by x32x01 ||
🔐 Firmware-level security is no longer optional - it’s a baseline
This is not my discovery - but it’s one that needs to be shared.
🔍 Cybersecurity researcher Juan Sacco (
📌 Issue #1: Passwords were found hardcoded inside the binary - an open invitation for reverse engineering.
📌 Issue #2: A privilege escalation vulnerability was found due to improper use of the .NET Profiler.
By loading a malicious DLL, an attacker could escalate privileges to SYSTEM and hijack the app’s control flow.
🔒 Vulnerability Summary:
• Device: RAD FT Firmware version A00-00 Build (WP0000051154) and prior
• Technique: DLL Injection via .NET Profiler
• Researcher: Juan Sacco
• Reported via: BugCrowd
• Source: https://exploitpack.com
🔐 Firmware-level security is no longer optional - it’s a baseline.
This is not my discovery - but it’s one that needs to be shared.
🔍 Cybersecurity researcher Juan Sacco (
jsacco@exploitpack.com) uncovered a serious security flaw while reversing the firmware of Dell RT (Radyum device).📌 Issue #1: Passwords were found hardcoded inside the binary - an open invitation for reverse engineering.
📌 Issue #2: A privilege escalation vulnerability was found due to improper use of the .NET Profiler.
By loading a malicious DLL, an attacker could escalate privileges to SYSTEM and hijack the app’s control flow.
🔒 Vulnerability Summary:
• Device: RAD FT Firmware version A00-00 Build (WP0000051154) and prior
• Technique: DLL Injection via .NET Profiler
• Researcher: Juan Sacco
• Reported via: BugCrowd
• Source: https://exploitpack.com
🔐 Firmware-level security is no longer optional - it’s a baseline.