@atc1441
  @atc1441
Aaron Christophel | Dump Flash of WCH CH552 Chip series using its bootloader vulnerability @atc1441 | Uploaded November 2019 | Updated October 2024, 12 hours ago.
Explaining of the Ch55x Series Bootloader vulnerability.

Normally this chip does not have a function to read back the content of flash but with this it is possible.

This "hack" works on CH551 CH552 CH553 CH554 CH558 and CH559 chips from the company WCH


Thanks to Thomas :)

Here are some Links to this topic:

Playstore App: play.google.com/store/apps/details?id=com.atcnetz.de.ch55xprogrammerV2&hl=gsw

Mikrocontroller.net thread: mikrocontroller.net/topic/462538

Thomas Freader PC flash Dump: mikrocontroller.net/topic/462538?goto=new#5873139

Bootloader source code: mikrocontroller.net/topic/462538?page=1#5784458
Dump Flash of WCH CH552 Chip series using its bootloader vulnerabilityHacking the Disney MagicBand that tracks you! + nRF31512 GlitchingE-Paper Wall 2.0 E-Ink Price Tag HackingBig vs. Small E-Paper display wall previewGICISKY E-Paper Shelf label Web Bluetooth controlCH552 usb Pcb soldering, How to Solder SOP16 chips and other partsHow not to reuse an OLED screen from a mobile phone (Failed Project)7.4 E-Paper Pricetag full custom firmware for Zigbee 88MZ100D6 Fitness tracker Accl stream to WebBluetooth example with sourcecodeUsing Precompiled Librarys in the Arduino IDE, D6 Fitness Tracker Heartrate Sensor DemoQuick teardown TripleQi Charging PadCH552 / CH559 Arduino core, lets make them Arduino compatible

Dump Flash of WCH CH552 Chip series using its bootloader vulnerability @atc1441

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER