Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9417 PoC — Broadcom BCM43xx Wi-Fi 芯片安全漏洞

Source
Associated Vulnerability
Title:Broadcom BCM43xx Wi-Fi 芯片安全漏洞 (CVE-2017-9417)
Description:Broadcom BCM43xx Wi-Fi chips是美国博通(Broadcom)公司的一款用于5G Wi-Fi中的组合芯片。Broadcom公司是Apple、Google、HTC、LG、Samsung等厂商的供应链厂商,Broadcom BCM43xx WiFi chips广泛应用于iOS和Android移动终端设备中。 Broadcom BCM43xx Wi-Fi chips中存在安全漏洞。处于同一Wi-Fi网络中的攻击者可利用该漏洞在设备使用的博通WiFi芯片上远程执行恶意代码。
Description
Broadpwn bug (CVE-2017-9417)
Readme
# Broadpwn
- Help  [![Donate](https://img.shields.io/badge/Donate-PayPal-green.svg)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=L2B2WU2L67XP8)
- Join or Ask: Linnebergmai@gmail.com 
- Broadpwn: https://goo.gl/xWC4hg | Youtube: https://youtu.be/GTb4Y2Y9shw 
- BlueBorne: https://goo.gl/PSDuwY | Youtube https://youtu.be/FJGGMyg0W38
- Yalu Jailbreak iOS 10.3.1 : https://goo.gl/9cSSPU
- Help PR.

# Broadpwn bug (CVE-2017-9417)

  Remotely Compromising Android and iOS via a Bug in Broadcom’s Wi-Fi Chipsets

  $ adb shell 
  
  #setenforce 0
  
  #cp fw_bcmdhd.bin /data/local/tmp/firmware/
  
  #chmod 755 /data/local/tmp/firmware/fw_bcmdhd.bin
  
  #mount -o bind /data/local/tmp/firmware /vendor/firmware
  
  #start 

  Join to our team for developing new software.

  If you have any questions, feel free to ask for more information: Linnebergmai@gmail.com
 
  Whatch the instruction: https://youtu.be/GTb4Y2Y9shw
File Snapshot

[4.0K] /data/pocs/324ded1617a05813271dc590d3aadb76b332948a ├── [8.1K] Broadpwn.zip └── [ 946] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.