You are viewing a single comment's thread from:

RE: LeoThread 2025-07-01 15:59

in LeoFinance4 months ago

Part 6/8:

Through experimentation, the speaker shares how they manipulated the SMU's operation and studied its firmware structure. The process involves understanding communication protocols and developing utilities to read the SMU's address space. Recognizing recurring patterns in the data can help identify specific functions executed by the SMU.

Disassembling the firmware reveals the nature of operations, where requests for power management are handled. The analysis emphasizes that although there are protective mechanisms in place, there exists a potential vulnerability due to inadequate checks on request handling that could allow for arbitrary code execution.

Discovering Vulnerabilities