Aaron Christophel | Exploit Friday: WCH CH573 Memory Read-out Protection bypass @atc1441 | Uploaded June 2023 | Updated October 2024, 5 hours ago.
This video shows you an overview of the WCH CH573 Memory Read-out Protection bypass exploit
08.06.2023 - Bypass was found and reported to WCH
09.06.2023 - WCH Confirmed the bypass and noted that newer the ISP Tool allows to set the erase length which allow to erase more than the 6-8K bytes as shown in this video. This makes the User of the CH573 responsible for the firmware protection. 6-8K bytes will be always erased.
WCH Noted that the 6-8K bytes where chosen to speed up the erasing.
As per WCH the erase length option does not need an update of the Bootloader.
Tested Bootloader version: 2.80
Follow me on twitter:
twitter.com/atc1441
This video shows you an overview of the WCH CH573 Memory Read-out Protection bypass exploit
08.06.2023 - Bypass was found and reported to WCH
09.06.2023 - WCH Confirmed the bypass and noted that newer the ISP Tool allows to set the erase length which allow to erase more than the 6-8K bytes as shown in this video. This makes the User of the CH573 responsible for the firmware protection. 6-8K bytes will be always erased.
WCH Noted that the 6-8K bytes where chosen to speed up the erasing.
As per WCH the erase length option does not need an update of the Bootloader.
Tested Bootloader version: 2.80
Follow me on twitter:
twitter.com/atc1441