Hi, I've found this:
http://thehackernews.com/2013/07/networ ... rable.html
long HTTP request on TCP port 5600 makes the tv restart
http://www.youtube.com/watch?v=U-R2epNnUiM
here is the script
http://www.mmeit.be/exploits/samsungtv_reset.txt
is there a possibility to use this vulnerability for SamyGo needs?
webserver on latest firmware hackable via long HTTP GET req
Re: webserver on latest firmware hackable via long HTTP GET
for C series? we have root on this tv already.
LE40B653T5W,UE40D6750,UE65Q8C
Have questions? Read SamyGO Wiki, Search on forum first!
FFB (v0.8), FFB for CI+ . Get root on: C series, D series, E series, F series, H series. rooting K series, exeDSP/exeTV patches[C/D/E/F/H]
DO NOT EVER INSTALL FIRMWARE UPGRADE
Have questions? Read SamyGO Wiki, Search on forum first!
FFB (v0.8), FFB for CI+ . Get root on: C series, D series, E series, F series, H series. rooting K series, exeDSP/exeTV patches[C/D/E/F/H]
DO NOT EVER INSTALL FIRMWARE UPGRADE
- beatfreak
- SamyGO Project Donor
- Posts: 598
- Joined: Tue Aug 23, 2011 9:03 am
- Location: Hamburg
- Contact:
Re: webserver on latest firmware hackable via long HTTP GET
and such an exploit doesn't offer that much space to get access...
but i think as we already have rooted our TVs, we are able to fix this issue easily
but i think as we already have rooted our TVs, we are able to fix this issue easily

//UE40C6500 @ T-VALDEUC 3011 // rooted manual HotelMode style // PVR to NFS via 18MB on-the-fly sparse XFS // >> decommissioned due to tuner death
//UE46F8090 @ T-FXPDEUC 1136 // rooted by new Widget // root starting with empty usb drive
FYI: you can close your ssh session with SamyGO with
If you can't fix it using dvct tape, you are not using enough dvct tape.
//UE46F8090 @ T-FXPDEUC 1136 // rooted by new Widget // root starting with empty usb drive
FYI: you can close your ssh session with SamyGO with
Code: Select all
~.