The Z3X Pandora Box [1] is a swiss army knife when it comes to attacking Mobile Phones running different chipsets with options to read/write/format partitions and to even root devices. The tool is bundled with chained exploits and its highly protected against Reverse Engineering, using different techniques like debugger, VM & UART sniffer checks among others -- this is the curiosity that fueled this research.
In the process of "playing around" with the tool, I was able to intercept its serial (UART) USB communication with a vulnerable Unisoc device. The captured and filtered serial data is included in this repo in the provided bin files which I believe is the exploit chain that exploits (at this stage) an unknown memory corruption vulnerability present in the vulnerable device's BootROM.
A fun scary fact is that the BootROM is readonly. A memory corruption vulnz means that the bug will never be patched, as long as the device is alive & supported.
The Device Under Test (DUT) that was used in this project will not be shared, but the list of vulnerable devices that the tool supports, can be found online.
Please Note: The information shared in this project is to be used for educational purposes ONLY and I shall not be liable for any damages caused from the direct use of any tools and/or exploits from this repo.