A detailed security research writeup exposing critical vulnerabilities in Zero Motorcycles electric bikes. Researchers reverse-engineered the Android app using JADX and Frida, extracted hardcoded credentials from the app's BuildConfig, downloaded firmware from the OTA server using a fake VIN, and discovered the firmware uses

35m read timeFrom persephonekarnstein.github.io
Post cover image
Table of contents
Depotting AttemptsAndroid AppFirmwareAttacksFridaCAN BusMalicious FirmwareWorst Case ScenariosA C2 for your MotorcycleStuxnet for your MotorcycleDisclosure Attempts and the LawDisclosure AttemptsDisclosure Success!Legal

Sort: