Exploit for Exynos devices to gain ACE in BootROM context.
Caution
The code for this exploit was previously stolen and used in an AI vibecoded tool made by Creeeeger. Be extremely careful when using his stuff, it might be broken and cause harm to your device.
A length parameter left unchecked in the USB Control Request code allows iRAM to be dumped, modified and resent to the device, allowing for code execution.
Caution
An SoC being vulnerable does not mean payloads and support are available for it.
- Exynos9810
- Exynos9820
- Exynos9830
- Exynos8825
- Exynos9925
There probably are many more.
There is another tool made by a great friend VDavid003, which supports more platforms.
usage: houston.py [-h] -p PAYLOAD [-d] [-o OUTPUT] [-c]
Exploit for Exynos devices to gain ACE in BootROM context.
options:
-h, --help show this help message and exit
-p, --payload PAYLOAD
Path to the payload to launch
-d, --debug Debug Mode
-o, --output OUTPUT Path to where to save payload output to
-c, --console-output Show output to console
Thanks to these teams and people we have houston!
- Chimera Tool
First discovery of the exploit circa 2021-2022. They provide the most advanced Exynos servicing capabilities in the market to a broad amount of devices, and that is thanks to this specific exploit, and many more. - CVE-2024-56426
This is the CVE houston is based off as we know. - Christopher Wade
Reported CVE-2024-56426 to Samsung - kethily-daniel
Gave me access to the tool for USB packet tracing to extract samples. - BotchedRPR
Helped with the initial research and creation of carte2. - VDavid003
Helped me reverse engineer the PoC via the packet dumps and personally tested on his devices. - halal-beef
Initial USB packet dumps and analysis of the PoC during the research lifecycle. - R0rt1z2
Huge help, even in payload creation, some stuff was based off his project, kaeru. - AntiEngineer
Huge help, gave knowledge and hints about ARM and is all around a great friend. - AA
Vulnerability inspiration, first use outside of Chimera. Someone I knew who conducted research on this exploit.