@atc1441
  @atc1441
Aaron Christophel | Exploit Friday: WCH CH573 Memory Read-out Protection bypass @atc1441 | Uploaded June 2023 | Updated October 2024, 5 hours ago.
This video shows you an overview of the WCH CH573 Memory Read-out Protection bypass exploit

08.06.2023 - Bypass was found and reported to WCH
09.06.2023 - WCH Confirmed the bypass and noted that newer the ISP Tool allows to set the erase length which allow to erase more than the 6-8K bytes as shown in this video. This makes the User of the CH573 responsible for the firmware protection. 6-8K bytes will be always erased.

WCH Noted that the 6-8K bytes where chosen to speed up the erasing.

As per WCH the erase length option does not need an update of the Bootloader.
Tested Bootloader version: 2.80

Follow me on twitter:
twitter.com/atc1441
Exploit Friday: WCH CH573 Memory Read-out Protection bypassSecond test drive 4WD HoverboardHow To open the UMIDIGI UWATCH2 SmartwatchPuma 200 Robot Arm Stäubli Arduino control workingHow to solder the E-Paper price tag ST-GM42001 for Arduino usageP8 DaFit Smartwatch Arduino Firmware demoDOOM on Toothbrush , DoomsbrushCH552 USB Keyboard Example and HOW TOArduino ESP32 SWD Flasher and nRF52 power glitcher previewTeardown of the Phosphor E-Paper WatchF07 Fitness Tracker Arduino Display test Nrf52New E-Paper pricetag model hacking, First Arduino custom code

Exploit Friday: WCH CH573 Memory Read-out Protection bypass @atc1441

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER