Google's Chromecast Already Exploited

Written by Michael Larabel in Google on 28 July 2013 at 03:11 PM EDT. 21 Comments
GOOGLE
Released this past week by Google alongside Android 4.3 and the new Nexus 7 tablet was the Chromecast, a $35 device to essentially relay web-pages and video content from your PC or mobile device to an HDMI TV. The Chromecast has now been exploited so a root shell is accessible.

The Chromecast is a nifty device as it costs only $35 and works with any HDMI-enabled display while being powered off USB and communicates over WiFi. Android/iOS devices can beam video content to the Chromecast (such as Netflix) or you can also enable any web-page to be shown via the Chrome web-browser on a desktop PC. It's really an interesting device especially due to its low price point.

GTVHacker.com has already managed to find a software exploit on the less than week old device. Their exploit will create a root shell on port 23 by using a modified boot-loader for the hardware, which turns out to be a single-core Marvell ARM SoC.

The software stack Chromecast runs on is for Google TV but with the Dalvik/Bionic code stripped away.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week