You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I made an Android App for the CH55x Chips to flash them via Android USB OTG.
Right now i made an update to Support V2.31 Bootloader's it is tested with the CH552G and until now the CH551 Flashing doesn't complete it seems that when flashing the CH551 the WCHISPTool is first sending some cfg commands.
I made an auto detect function to recognize the bootloader version and also one for reading, writing or erasing the dataflash
How can i contact you? i dont want to spam the issue threads
another think i found is an firmware readout security risk, you can dump the firmware of the following chips CH551,CH552,CH553,CH554 via the verfiy command, u just need to bruteforce every byte, there is a function in my app to read out the bootloader wich uses this exploit.
The text was updated successfully, but these errors were encountered:
Hi rgwan,
I made an Android App for the CH55x Chips to flash them via Android USB OTG.
Right now i made an update to Support V2.31 Bootloader's it is tested with the CH552G and until now the CH551 Flashing doesn't complete it seems that when flashing the CH551 the WCHISPTool is first sending some cfg commands.
Here is the link to the V2 Programmer: https://play.google.com/store/apps/details?id=com.atcnetz.de.ch55xprogrammerV2
i needed to puplish a whole new app because i lost the cert passwort for the old app :D
here is the old one: https://play.google.com/store/apps/details?id=com.atcnetz.de.ch55xprogrammer
I made an auto detect function to recognize the bootloader version and also one for reading, writing or erasing the dataflash
How can i contact you? i dont want to spam the issue threads
another think i found is an firmware readout security risk, you can dump the firmware of the following chips CH551,CH552,CH553,CH554 via the verfiy command, u just need to bruteforce every byte, there is a function in my app to read out the bootloader wich uses this exploit.
The text was updated successfully, but these errors were encountered: