Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Fusee Launcher Switch: Difference between revisions

From GameBrew
No edit summary
No edit summary
 
Line 5: Line 5:
|author=Kate Temkin, Qyriad
|author=Kate Temkin, Qyriad
|lastupdated=2019/04/18
|lastupdated=2019/04/18
|type=Payload senders (Software)
|type=Payload Senders (Software)
|version=2019
|version=2019
|license=GPL-2.0
|license=GPL-2.0

Latest revision as of 04:22, 9 July 2023

Fusee Launcher
Fuseelaunchernx.png
General
AuthorKate Temkin, Qyriad
TypePayload Senders (Software)
Version2019
LicenseGPL-2.0
Last Updated2019/04/18
Links
Download
Website
Source

The Fusée Launcher is a proof-of-concept arbitrary code loader for a variety of Tegra processors, which takes advantage of CVE-2018-6242 ("Fusée Gelée") to gain arbitrary code execution and load small payloads over USB.

The vulnerability is documented in the report subfolder.

User guide

The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported. Instructions for Windows specifically can be found on the wiki.

With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. ./fusee-launcher.py payload.bin. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver.

Screenshots

fuseelaunchernx2.png

Credits

Fusée Gelée (CVE-2018-6242) was discovered and implemented by Kate Temkin (@ktemkin); its launcher is developed and maintained by Mikaela Szekely (@Qyriad) and Kate Temkin (@ktemkin).

Credit goes to:

  • Qyriad - maintainership and expansion of the code.
  • SciresM, motezazer - guidance and support.
  • hedgeberg, andeor - dumping the Jetson bootROM.
  • TuxSH - help with a first pass of bootROM RE.
  • the ReSwitched team.

Love / greetings to:

  • Levi / lasersquid.
  • Aurora Wright.
  • f916253.
  • MassExplosion213.
  • CVE-2018-6242 was also independently discovered by fail0verflow member shuffle2 as the "shofEL2" vulnerability-- so that's awesome, too.

External links

Advertising: