WhisperX tag archive

#firmware

This page collects WhisperX intelligence signals tagged #firmware. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-04 12:27:07 · GitHub Issues

1. Rizin 0.9.0 Heap-Use-After-Free DoS Vulnerability in ESP32 Firmware Parser

A critical heap-use-after-free vulnerability has been identified in the Rizin reverse engineering framework, exposing users to denial-of-service (DoS) attacks through a crafted binary file. The flaw resides within the library's LE (Linear Executable) format parser, specifically in the `le_load_fixup_record()` function ...

The Lab · 2026-04-11 20:22:29 · GitHub Issues

2. GitHub Issue: Phase 3 PR C — Router Firmware Elevated to First-Class CVE Target in Simulation

A major simulation project is advancing a core component of its cyber defense model, formally elevating router firmware to a primary attack surface. The update, designated as Phase 3's "PR C," redefines routers as first-class CVE targets, integrating their firmware directly into the procedural vulnerability lifecycle t...

The Lab · 2026-04-16 18:22:45 · GitHub Issues

3. Critical Firmware Flaw: PSK Exposed in Plaintext on Device Flash, UART, and LCD at First Boot

A critical security vulnerability exposes the primary authentication key (PSK) of a device in plaintext across multiple attack vectors immediately upon first boot. The PSK is stored as raw bytes in flash memory, protected only by a CRC checksum, and is simultaneously printed to the UART serial interface and displayed o...