-
Notifications
You must be signed in to change notification settings - Fork 4
Open
Description
In the sweyntooth github, there is a proof of concept scripts section that shows us how we can run an exploit script.
i.e. python Telink_key_size_overflow.py COM7 A4:C1:38:D8:AD:A9
In BLEDiff, i can see "Run FSM Inference Module" section. But there are 3 subsections in that section. Not sure what each of that do. Would you please describe a little bit on each of these subsections? Or possibly a block diagram?
In the CVE-2022-40480, (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40480), it references to this repository.
I would like to reproduce this issue testing on a nRF5340 dev-kit. However, I don't see any exploit script in this repo, please advice. Thank you very much.
Metadata
Metadata
Assignees
Labels
No labels