понедельник, 20 апреля 2026 г.

Codex hacked a Samsung TV

Calif.io on GitHub documents how they gave Codex a foothold on a Samsung television. Then it popped root.

We started with a shell inside the browser application on a Samsung TV, and a fairly simple question: if we gave Codex a reliable way to work against the live device and the matching firmware source, could it take that foothold all the way to root?

Codex had to enumerate the target, narrow the reachable attack surface, audit the matching vendor driver source, validate a physical-memory primitive on the live device, adapt its tooling to Samsung’s execution restrictions, and iterate until the browser process became root on a real compromised device.

We didn’t provide a bug or an exploit recipe. We provided an environment Codex could actually operate in, and the easiest way to understand it is to look at the pieces separately.

See the details of the exploits in the post here and on GitHub.

 



from Adafruit Industries – Makers, hackers, artists, designers and engineers! https://ift.tt/GLzcFO5
via IFTTT

Комментариев нет:

Отправить комментарий

Know us

Our Team

Tags

Video of the Day

Contact us

Имя

Электронная почта *

Сообщение *