Hacking Amazon's eero 6 (part 2)

This is second part of the Hacking Amazon’s eero 6 device, which covers reading and extracting firmware data directly from a eMMC flash chip. This is after the chip had been desoldered (not by me) off the device. I also share the equipment I bought during this project, including what didn’t work and what did. You can skip to this section on modifying a BGA159 chip reader. The firmware on the eMMC at the time version v7....

27 June, 2024 · 12 min · Naz Markuta

Exploiting a JDBC deserialization vulnerability in MFT Server by JSCAPE

Update: Fixed proof of concept link. Background This research project started back in July 2023, at around the same time when a critical vulnerability in a popular file-sharing software called MoveIt Transfer was disclosed. More details about that particular vulnerability can be found here and here. I was curious and looked for other similar file-sharing software with security issues. And so a few Google searches later, I found a candidate, a software for enterprises called MFT Server by JSCAPE....

22 March, 2024 · 10 min · Naz Markuta

Hacking Amazon's eero 6 (part 1)

This is the first in the series of hacking Amazon’s eero 6 (3rd generation) Wi-Fi device. In this post I will be focusing on device disassembly, identifying pins, brute forcing JTAG, and reading serial output. The second part of the blog can be found: https://markuta.com/eero-6-hacking-part-2/ About Eero is a San Francisco-based wireless Internet company founded in 2015. It is known for making household consumer Wi-Fi products. The company was acquired by Amazon in 2019 for $97 million....

15 June, 2023 · 25 min · Naz Markuta