{
	"id": "ad85ad25-30b2-48db-8937-97cbbae6b969",
	"created_at": "2026-04-06T00:18:39.914418Z",
	"updated_at": "2026-04-10T03:19:59.35033Z",
	"deleted_at": null,
	"sha1_hash": "0d0105b52d46afc71ac0aa7bb6dcdfb0d5eae85b",
	"title": "Kernel Backdoor found in Gadgets Powered by Popular Chinese ARM Maker",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 627133,
	"plain_text": "Kernel Backdoor found in Gadgets Powered by Popular Chinese\r\nARM Maker\r\nBy The Hacker News\r\nPublished: 2016-05-12 · Archived: 2026-04-05 16:29:47 UTC\r\nHow to Hack an Android device?\r\nIt is possibly one of the most frequently asked questions on the Internet.\r\nAlthough it's not pretty simple to hack Android devices and gadgets, sometimes you just get lucky to find a\r\nbackdoor access.\r\nThanks to Allwinner, a Chinese ARM system-on-a-chip maker, which has recently been caught shipping a version\r\nof Linux Kernel with an incredibly simple and easy-to-use built-in backdoor.\r\nChinese fabless semiconductor company Allwinner is a leading supplier of application processors that are used in\r\nmany low-cost Android tablets, ARM-based PCs, set-top boxes, and other electronic devices worldwide.\r\nSimple Backdoor Exploit to Hack Android Devices\r\nhttps://thehackernews.com/2016/05/android-kernal-exploit.html\r\nPage 1 of 3\n\nAll you need to do to gain root access of an affected Android device is…\r\nSend the text \"rootmydevice\" to any undocumented debugging process.\r\nThe local privileges escalation backdoor code for debugging ARM-powered Android devices managed to make its\r\nway in shipped firmware after firmware makers wrote their own kernel code underneath a custom Android build\r\nfor their devices, though the mainstream kernel source is unaffected.\r\nThe backdoor code is believed to have been left by mistake by the authors after completing the debugging process.\r\nFor exploiting this issue, any process running with any UID can be converted into root easily by simply using the\r\nfollowing command:\r\necho \"rootmydevice\" \u003e /proc/sunxi_debug/sunxi_debug\r\nThe Linux 3.4-sunxi kernel was originally designed to support the Android operating system on Allwinner ARM\r\nfor tablets, but later it was used to port Linux to many Allwinner processors on boards like Banana Pi micro-PCs,\r\nOrange Pi, and other devices.\r\nAt the forum of the Armbian operating system, a moderator who goes by the name Tkaiser noted that the backdoor\r\ncode could remotely be exploitable \"if combined with networked services that might allow access to /proc.\"\r\nThis security hole is currently present in every operating system image for A83T, H3 or H8 devices that rely on\r\nkernel 3.4, he added.\r\nhttps://thehackernews.com/2016/05/android-kernal-exploit.html\r\nPage 2 of 3\n\nThis blunder made by the company has been frustrating to many developers. Allwinner has also been less\r\ntransparent about the backdoor code. David Manouchehri released the information about the backdoor through its\r\nown Github account (Pastebin) and then apparently deleted it.\r\nFound this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content\r\nwe post.\r\nSource: https://thehackernews.com/2016/05/android-kernal-exploit.html\r\nhttps://thehackernews.com/2016/05/android-kernal-exploit.html\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://thehackernews.com/2016/05/android-kernal-exploit.html"
	],
	"report_names": [
		"android-kernal-exploit.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434719,
	"ts_updated_at": 1775791199,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0d0105b52d46afc71ac0aa7bb6dcdfb0d5eae85b.pdf",
		"text": "https://archive.orkl.eu/0d0105b52d46afc71ac0aa7bb6dcdfb0d5eae85b.txt",
		"img": "https://archive.orkl.eu/0d0105b52d46afc71ac0aa7bb6dcdfb0d5eae85b.jpg"
	}
}