The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "AT+XLOG Vulnerability"
(→Exploit) |
|||
Line 1: | Line 1: | ||
− | Used as an injection vector for the current [[iPhone 3G]] [[Unlock 2.0|unlock]] payload - [[ultrasn0w]]. Currently available in all baseband versions |
+ | Used as an injection vector for the current [[iPhone 3G]] [[Unlock 2.0|unlock]] payload - [[ultrasn0w]]. Currently available in all baseband versions until 04.26.08. |
==Credit== |
==Credit== |
Revision as of 01:33, 4 July 2009
Used as an injection vector for the current iPhone 3G unlock payload - ultrasn0w. Currently available in all baseband versions until 04.26.08.
Credit
Exploit
There is a buffer overflow in the AT+XLOG=1,"..." command, which allows unsigned code execution on the X-Gold 608.
Implementation
The exploit is used in ultrasn0w.