Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-38694 PoC — UNISOC Chipsets 安全漏洞

Source
Associated Vulnerability
Title:UNISOC Chipsets 安全漏洞 (CVE-2022-38694)
Description:UNISOC Chipsets是中国紫光展锐(UNISOC)公司的芯片组。 UNISOC Chipsets存在安全漏洞,该漏洞源于未检查写入地址,可能导致本地权限提升。
Description
Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices
Readme
Anbernic Unisoc T820 Bootloader Unlock Guide - TheGammaSqueeze - https://github.com/TheGammaSqueeze
---------------------------------------------------------------------------------------------------

The bootloader unlock is required before flashing any custom firmware or custom fixes.
You may be interested in this analog stick sensitvity fix after unlocking your bootloader: https://github.com/TheGammaSqueeze/Bootloader_Unlock_Anbernic_T820/releases/tag/analog_fix

Warning:
- Proceed at your own risk. Unlocking the bootloader will void your warranty and can potentially damage your device. I am not responsible for any damage to your device or any data loss incurred.
- Only supported on Windows systems.


Important Notices:
- Data Erasure: Unlocking the bootloader will erase all data on your device. Your device will be factory reset to its original state.
- Unlock Warning: After unlocking, an unlock warning message will appear on the screen every time you boot your device. This is normal and cannot be removed.

Prerequisites:
- Unisoc USB Drivers: Install the Unisoc USB drivers located in the UnisocDrivers folder. This is essential for your computer to communicate with the device.

Unlocking Procedure:
- Shut Down Device: Ensure your device is completely shut down with no USB cable attached.
- Run Unlock Script: Open the unlock.bat script on your computer.

Connect Device:
- Within 30 seconds of running the script, hold down the HOME/BACK button on the turned-off unit.
- While holding the button, plug in the USB cable to your device.
- Continue Unlock Process: The unlock script will now proceed. You can release any buttons once the script is running.
- Wipe data: Your unit will now reboot. It will likely show the battery charging screen, in this case just turn on the device. Upon the second reboot you will be asked to wipe your device. Use the volume buttons to navigate to the wipe option, use the power button to confirm this option. Your unlock is now complete.

Locking bootloader:
- To lock your bootloader again, you will need to ensure you flash the original firmware back to avoid a brick. This will wipe your data again. Once this is done, it'll be as if you never unlocked or modified the device at all.
- Locking instructions: Enable USB Debugging, then use the following commands:
- - adb reboot bootloader
  - fastboot flashing lock
  - Press the home/back button to confirm you want to relock
  - fastboot reboot
 
Stock firmware package:
- RG 556: https://drive.google.com/file/d/1hYuUPBTHAghZXXVt5urnAhJP-_vofg3K/view?usp=sharing
- RG Cube: https://drive.google.com/file/d/1DBl9ZwvyqUdjMmetA2ekYWKS1uUcmI0b/view?usp=sharing

Credits:
This bootloader unlocking process is based on the work from the following repository: [TomKing062/CVE-2022-38694_unlock_bootloader](https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader). We are using a modified version of this exploit specifically tailored for our Anbernic devices.

By following this guide, you acknowledge that you understand the risks involved in unlocking your device's bootloader. Ensure you have backed up all important data before proceeding.
File Snapshot

[4.0K] /data/pocs/9ed2dcfdd1ddd5656ef758fdca9e6416e68b3708 └── [3.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.