Configuring a IpSec VPN (fortigate client)

I was in need to have a working VPN with Fortigate and here I’m going to recollect the procedure that has permited to accomplish such simple but incredibly complex task.

VGA controller simulation with verilator

In my two previous posts I implemented a simple VGA controller and one with the text mode but now I want to explore the possibility to simulate it using verilator.

Reversing the USB update process of a device

I’m again at it: I have a device that I want to know how it works and I started to reverse it, this time without any particular reason if not curiosity.

QED formulary

\(\def\Tr{\hbox{Tr}}\) \(\def\slashme#1{\rlap{\backslash}{#1}}\) \(\def\pslash{\rlap{\backslash}{p}}\) \(\def\partialslash{\rlap{\backslash}{\partial}}\)

CVE-2020-8423: exploiting the TP-LINK TL-WR841N V10 router

In this post I’ll explore the vulnerability that I found in the TL-WR841N router, a MIPS device by TP-Link, during a code auditing and how I wrote an exploit for it. To this vulnerability has been assigned the CVE-2020-8423.