Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Fusee Launcher Switch: Difference between revisions

From GameBrew
(Created page with "{{Infobox Switch Homebrews |title=Fusee Launcher |image=fuseelauncherswitch.png |description=A reference implementation launcher for the Fusée Gelée Tegra X1 bootROM exploit. |author=Qyriad |lastupdated=2019/04/18 |type=Payload senders (Software) |version=v1.0 |license=GPL-2.0 |download=https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch.7z |website=https://github.com/Qyriad/fusee-launcher |source=https://github.com/Qyriad/fusee-launcher |donation= }} {{#seo:...")
 
No edit summary
Line 1: Line 1:
{{Infobox Switch Homebrews
{{Infobox Switch Homebrews
|title=Fusee Launcher
|title=Fusee Launcher
|image=fuseelauncherswitch.png
|image=fuseelaunchernx.png
|description=A reference implementation launcher for the Fusée Gelée Tegra X1 bootROM exploit.
|description=A reference implementation launcher for the Fusée Gelée Tegra X1 bootROM exploit.
|author=Qyriad
|author=Qyriad
Line 8: Line 8:
|version=v1.0
|version=v1.0
|license=GPL-2.0
|license=GPL-2.0
|download=https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch.7z
|download=https://dlhb.gamebrew.org/switchhomebrews/fuseelaunchernx.7z
|website=https://github.com/Qyriad/fusee-launcher
|website=https://github.com/Qyriad/fusee-launcher
|source=https://github.com/Qyriad/fusee-launcher
|source=https://github.com/Qyriad/fusee-launcher
|donation=
|donation=
}}
}}
{{#seo:
The Fusée Launcher is a proof-of-concept arbitrary code loader for a variety of Tegra processors, which takes advantage of CVE-2018-6242 ("Fusée Gelée") to gain arbitrary code execution and load small payloads over USB.
|title=Switch Payloads (Payload senders (Software)) - GameBrew
 
|title_mode=append
The vulnerability is documented in the report subfolder.
|image=fuseelauncherswitch.png
|image_alt=Fusee Launcher
}}
{{cleanup|article|Needs cleanup}}
A reference implementation launcher for the Fusée Gelée Tegra X1 bootROM exploit.


==Media==
==User guide==
<youtube></youtube>
The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported. Instructions for Windows specifically can be found on the [https://github.com/Qyriad/fusee-launcher/wiki wiki].


With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. <code>./fusee-launcher.py payload.bin</code>. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver.


==Screenshots==
==Screenshots==
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-01.png
https://dlhb.gamebrew.org/switchhomebrews/fuseelaunchernx2.png
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-02.png
 
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-03.png
==Credits==
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-04.png
Fusée Gelée (CVE-2018-6242) was discovered and implemented by Kate Temkin (@ktemkin); its launcher is developed and maintained by Mikaela Szekely (@Qyriad) and Kate Temkin (@ktemkin).
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-05.png
 
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-06.png
Credit goes to:
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-07.png
*Qyriad - maintainership and expansion of the code.
https://dlhb.gamebrew.org/switchhomebrews/fuseelauncherswitch-08.png
*SciresM, motezazer - guidance and support.
*hedgeberg, andeor - dumping the Jetson bootROM.
*TuxSH - help with a first pass of bootROM RE.
*the ReSwitched team.


==Changelog==
Love / greetings to:
'''v.1.0'''
*Levi / lasersquid.
* First Release.
*Aurora Wright.
*f916253.
*MassExplosion213.
*CVE-2018-6242 was also independently discovered by fail0verflow member shuffle2 as the "shofEL2" vulnerability-- so that's awesome, too.


== External links ==
== External links ==
* Gbatemp - https://github.com/Qyriad/fusee-launcher
* GitHub - https://github.com/Qyriad/fusee-launcher
* Github - https://github.com/Qyriad/fusee-launcher
* FAQ: Fusée Gelée - https://www.ktemkin.com/faq-fusee-gelee/
* Reddit -

Revision as of 04:17, 7 July 2023

Fusee Launcher
Fuseelaunchernx.png
General
AuthorQyriad
TypePayload senders (Software)
Versionv1.0
LicenseGPL-2.0
Last Updated2019/04/18
Links
Download
Website
Source

The Fusée Launcher is a proof-of-concept arbitrary code loader for a variety of Tegra processors, which takes advantage of CVE-2018-6242 ("Fusée Gelée") to gain arbitrary code execution and load small payloads over USB.

The vulnerability is documented in the report subfolder.

User guide

The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported. Instructions for Windows specifically can be found on the wiki.

With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. ./fusee-launcher.py payload.bin. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver.

Screenshots

fuseelaunchernx2.png

Credits

Fusée Gelée (CVE-2018-6242) was discovered and implemented by Kate Temkin (@ktemkin); its launcher is developed and maintained by Mikaela Szekely (@Qyriad) and Kate Temkin (@ktemkin).

Credit goes to:

  • Qyriad - maintainership and expansion of the code.
  • SciresM, motezazer - guidance and support.
  • hedgeberg, andeor - dumping the Jetson bootROM.
  • TuxSH - help with a first pass of bootROM RE.
  • the ReSwitched team.

Love / greetings to:

  • Levi / lasersquid.
  • Aurora Wright.
  • f916253.
  • MassExplosion213.
  • CVE-2018-6242 was also independently discovered by fail0verflow member shuffle2 as the "shofEL2" vulnerability-- so that's awesome, too.

External links

Advertising: