You do not have permission to edit this page, for the following reason:
The action you have requested is limited to users in one of the groups: Users, Administrators.
Free text:
The Fusée Launcher is a proof-of-concept arbitrary code loader for a variety of Tegra processors, which takes advantage of CVE-2018-6242 ("Fusée Gelée") to gain arbitrary code execution and load small payloads over USB. The vulnerability is documented in the report subfolder. ==User guide== The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported. Instructions for Windows specifically can be found on the [https://github.com/Qyriad/fusee-launcher/wiki wiki]. With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. <code>./fusee-launcher.py payload.bin</code>. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver. ==Screenshots== https://dlhb.gamebrew.org/switchhomebrews/fuseelaunchernx2.png ==Credits== Fusée Gelée (CVE-2018-6242) was discovered and implemented by Kate Temkin (@ktemkin); its launcher is developed and maintained by Mikaela Szekely (@Qyriad) and Kate Temkin (@ktemkin). Credit goes to: *Qyriad - maintainership and expansion of the code. *SciresM, motezazer - guidance and support. *hedgeberg, andeor - dumping the Jetson bootROM. *TuxSH - help with a first pass of bootROM RE. *the ReSwitched team. Love / greetings to: *Levi / lasersquid. *Aurora Wright. *f916253. *MassExplosion213. *CVE-2018-6242 was also independently discovered by fail0verflow member shuffle2 as the "shofEL2" vulnerability-- so that's awesome, too. == External links == * GitHub - https://github.com/Qyriad/fusee-launcher * GitHub - https://github.com/Qyriad/fusee-launcher/blob/master/report/fusee_gelee.md * FAQ: Fusée Gelée - https://www.ktemkin.com/faq-fusee-gelee/
Advertising: