-
-
[转帖]Dissecting a MediaTek BootROM exploit
-
发表于: 2021-2-1 17:02 2178
-
Dissecting a MediaTek BootROM exploit
A bricked Xiaomi phone led me to discover a project in Github that uses a MediaTek BootROM exploit that was undocumented. The exploit was found by Xyz, and implemented by Chaosmaster. The initial exploit was already available for quite a while. Since I have managed to revive my phone, I am documenting my journey to revive it and also explains how the exploit works. This exploit allows unsigned code execution, which in turn allows us to read/write any data from our phone.
For professionals: you can just skip to how the BootROM exploit works (spoiler: it is very simple). This guide will try to guide beginners so they can add support for their own phones. I want to show everything but it will violate MediaTek copyright, so I will only snippets of decompilation of the boot ROM.
a83K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6@1K9h3&6&6K9r3q4U0K9#2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3U0q4Q4x3V1j5H3x3g2)9J5c8U0x3I4i4K6u0r3k6r3W2K6M7$3g2U0N6r3W2F1k6#2)9J5k6r3q4Q4x3X3c8E0k6h3c8A6j5i4c8W2K9#2)9J5k6r3u0G2L8%4c8J5L8$3#2Q4x3X3c8W2P5s2m8D9L8$3W2@1i4K6u0r3