There is a vulnerability/backdoor in webOS 5+ that allows you to easily run arbitrary commands as root during the boot process. The easiest way to exploit it simply involves putting a file on a USB drive and having it connected to your TV while it boots. There are two other methods that are more complex and require additional exploits.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # | |
| # Update Pihole's custom.list based on the "hostname" property of a container. | |
| # | |
| # Environment variables | |
| # - OVERRIDE_IP sets the IP of the container in Pihole's DNS records. Defaults to container IP in Docker network. | |
| # - DOMAIN_FILTER only triggers the updates on a match. If empty, it'll always update the records file. | |
| # - PIHOLE_CUSTOM_LIST_FILE /etc/hosts compatible DNS records file in format "IP hostname". | |
| # - PIHOLE_CONTAINER_NAME because we need to reload Pihole's internal resolver when making changes | |
| # |
I'm not going to be maintaining this document anymore. I'm leaving it as-is since much of the FAQ section is still accurate and has yet to be incorporated into other resources.
Use CanI.RootMy.TV to find an exploit for your TV.
We did it! We broke gist.github.com ;) So head over to the new home! Thank you all!
2021.10.20: https://github.com/AveYo/MediaCreationTool.bat now open for interaction
Not just an Universal MediaCreationTool wrapper script with ingenious support for business editions,
A powerful yet simple windows 10 / 11 deployment automation tool as well!
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/php | |
| <?PHP | |
| error_reporting(E_STRICT | E_ALL); | |
| ini_set('display_errors', '1'); | |
| /* | |
| bleeding_edge_toolkit Copyright 2018-2023, ljm42 | |
| This program is free software; you can redistribute it and/or | |
| modify it under the terms of the GNU General Public License version 2, | |
| as published by the Free Software Foundation. |
