onekey_rl Profile Banner
ONEKEY Research Labs Profile
ONEKEY Research Labs

@onekey_rl

Followers
163
Following
16
Media
4
Statuses
47

Security researchers at @onekey_sec

Joined March 2021
Don't wanna be here? Send us removal request.
@onekey_rl
ONEKEY Research Labs
2 months
One of our own identified a buffer overflow in an industrial Bluetooth stack, details are now available at
0
2
1
@onekey_rl
ONEKEY Research Labs
2 months
RT @qkaiser: We recently released a static code analysis feature on the platform. Focus is on shell scripts, specifically the ones used in….
0
2
0
@onekey_rl
ONEKEY Research Labs
3 months
Since MITRE is still up, here's the CVE details:.- -
2
0
0
@onekey_rl
ONEKEY Research Labs
3 months
Read the full write-up with all technical details, insights, and disclosure timeline: .- -
www.onekey.com
Explore ONEKEY Research Lab's security advisory detailing a critical vulnerability in Viasat modems. Learn about the risks and recommended actions.
1
0
2
@onekey_rl
ONEKEY Research Labs
3 months
This case shows how automated static analysis can uncover hidden threats in embedded systems—before attackers do. Opaque firmware is a systemic risk. Visibility is key.
1
0
0
@onekey_rl
ONEKEY Research Labs
3 months
Shout-out to Viasat for a smooth coordinated disclosure process. OTA patching complex device fleets isn’t easy—props to their team for handling it transparently.
1
0
0
@onekey_rl
ONEKEY Research Labs
3 months
Affected devices include Viasat RM4100, RM4200, EM4100, RM5110, RM5111, RG1000, RG1100, EG1000, and EG1020. Make sure your devices are updated!.
1
0
0
@onekey_rl
ONEKEY Research Labs
3 months
For CVE-2024-6199, you would need the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem to manipulate specific responses and gain code execution. This is only reachable on devices with DDNS enabled.
1
0
0
@onekey_rl
ONEKEY Research Labs
3 months
With a single crafted HTTP request, an attacker can overflow the stack and hijack execution flow using ROP techniques for CVE-2024-6198. No authentication required.
1
0
0
@onekey_rl
ONEKEY Research Labs
3 months
CVE-2024-6199 was identified in the dynamic DNS feature, where data obtained over a plaintext connection is unsafely parsed.
Tweet media one
1
0
0
@onekey_rl
ONEKEY Research Labs
3 months
CVE-2024-6198 was found in "SNORE"—a web interface running on ports 3030 and 9882 via lighttpd on several Viasat modem models. The bug? A classic case of unsafe sscanf usage for URI parsing.
Tweet media one
1
2
1
@onekey_rl
ONEKEY Research Labs
3 months
A routine firmware scan by a ONEKEY customer turned into something much bigger. Critical stack buffer overflows were discovered in Viasat satellite modems. Unauthenticated RCE over LAN and OTA interfaces with CVE-2024-6198, unauthenticated RCE over WAN with 2024-6199.
1
3
6
@onekey_rl
ONEKEY Research Labs
1 year
Our automated binary static analysis does it again ! This time it's an unauthenticated command injection affecting TP-Link gaming routers.
0
2
5
@onekey_rl
ONEKEY Research Labs
1 year
Our latest security advisory is out. We identified remote command execution affecting Lua code within wireless backhaul devices from Ligowave.
@qkaiser
Quentin Kaiser
1 year
Wireless backhaul devices / point-to-point devices are interesting targets 📡
0
0
3
@onekey_rl
ONEKEY Research Labs
1 year
RT @qkaiser: New batch of automatically identified vulnerabilities just dropped. Affects industrial ethernet router from Delta Electronics.….
0
3
0
@onekey_rl
ONEKEY Research Labs
1 year
RT @qkaiser: Got nerd sniped by @wvuuuuuuuuuuuuu so I looked at D-Link “backdoor” (CVE-2024-3272, CVE-2024-3273). Our pipeline spot it, but….
0
4
0
@onekey_rl
ONEKEY Research Labs
1 year
RT @qkaiser: Small anthology of “silently” patched bugs identified by our binary static analysis feature in FOSS present in firmwares. We’l….
0
2
0
@onekey_rl
ONEKEY Research Labs
1 year
RT @qkaiser: I have been working on this with my team over the last year, so super happy it’s finally out ! ✨I’m providing as much details….
Tweet media one
www.onekey.com
Uncover ONEKEY's new Binary Zero-Day Identification feature, designed to identify vulnerabilities in executable binaries. Click now to find out more.
0
7
0
@onekey_rl
ONEKEY Research Labs
2 years
We've published details about the unblob features that landed in the second half of 2023. Check it out ⬇️
0
1
5
@onekey_rl
ONEKEY Research Labs
2 years
unblob version 23.10.31 🎃 is out ! Includes many improvements for spoOoky file formats like CPIO, tar v7, and truncated FAT images. We also support Python 3.12 so Arch users are not left behind. Release notes: Installation:
Tweet media one
unblob.org
unblob is an accurate, fast, and easy-to-use extraction suite. unblob parses unknown binary blobs for more than 30 different archive, compression, and file-system formats, extracts their content...
0
2
6