🦜 hyprblog
@blog.coffinsec.com@rss-parrot.net
I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline!
Brought to you by the RSS Parrot.
---
Vulnerability research, software development, and other technobabble.
Your feed and you don't want it here? Just
e-mail the birb.
mediatek? more like media-REKT, amirite.
https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html
Published: December 15, 2025 00:00
A year-in-review going over 19+ bugs in Mediatek's MT76xx/MT7915 (and others) wifi chipsets I reported this year, PoCs included!
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
Published: August 30, 2024 00:00
a post going over 4 exploits for CVE-2024-20017, a remotely exploitable buffer overflow in a component of the MediaTek MT7622 SDK.
chonked pt.2: exploiting cve-2023-33476 for remote code execution
https://blog.coffinsec.com/0day/2023/06/19/minidlna-cve-2023-33476-exploits.html
Published: June 19, 2023 00:00
second part in a two-part series going over heap overflow in MiniDLNA (CVE-2023-33476). this post provides a walkthrough of steps taken to write an exploit for this vulnerability in order to achieve remote code execution and pop a shell.
chonked pt.1: MiniDLNA 1.3.2 HTTP Chunk Parsing Heap Overflow (CVE-2023-33476) Root Cause Analysis
https://blog.coffinsec.com/0day/2023/05/31/minidlna-heap-overflow-rca.html
Published: May 31, 2023 00:00
first part in a two-part series going over a heap overflow in MiniDLNA, a media server commonly deployed in embedded environments. this post provides a summary and root cause analysis of the vulnerability.
RAX30 Patch Diff Analysis & Nday Exploit for ZDI-23-496
https://blog.coffinsec.com/nday/2023/05/12/rax30-patchdiff-nday-analysis.html
Published: May 12, 2023 00:00
patch diff analysis of the latest patches for the netgear rax30 and an nday exploit for one of them (ZDI-23-496)
nday exploit: libinput format string bug, canary leak exploit (cve-2022-1215)
https://blog.coffinsec.com/nday/2022/08/04/CVE-2022-1215-libinput-fmt-canary-leak.html
Published: August 4, 2022 00:00
a quick post on a format string bug in libinput I found last year but never got around to debugging, plus some exploit code to leak the stack canary on a default Xubuntu 20.04.4 system.
nday exploit: netgear orbi unauthenticated command injection (CVE-2020-27861)
https://blog.coffinsec.com/research/2022/07/02/orbi-nday-exploit-cve-2020-27861.html
Published: July 2, 2022 00:00
rediscovering and developing a weaponized exploit for a command injection vulnerability in Orbi wifi systems that was reported and patched last year.
orbi hunting 0x1: crashes in soap-api
https://blog.coffinsec.com/research/2022/06/19/orbi-hunting-1-soap-api-crashes.html
Published: June 19, 2022 00:00
a walkthrough of my experience finding a buffer overflow, discovering a null pointer deref along the way, and eventually figuring out the bug wasn't (easily) exploitable.
orbi hunting 0x0: introduction, UART access, recon
https://blog.coffinsec.com/research/2022/06/12/orbi-hunting-0-intro-uart.html
Published: June 12, 2022 00:00
a data dump of findings and notes taken while hunting for vulnerabilities on the Netgear Orbi.
fuzzing udhcpd: a hacky approach
https://blog.coffinsec.com/fuzzing/2022/06/05/fuzzing-udhcpd.html
Published: June 5, 2022 00:00
I wanted to do some fuzzing against udhcpd recently but was feeling too lazy to write a harness from scratch, so instead modified the existing udhcp server code to turn it into a harness using AFL’s LLVM persistent mode and then modified the udhcp client…