Skip to content

*Not an Issue* Info for V2 and Android App #7

@atc1441

Description

@atc1441

Hi rgwan,

I made an Android App for the CH55x Chips to flash them via Android USB OTG.

Right now i made an update to Support V2.31 Bootloader's it is tested with the CH552G and until now the CH551 Flashing doesn't complete it seems that when flashing the CH551 the WCHISPTool is first sending some cfg commands.

Here is the link to the V2 Programmer: https://play.google.com/store/apps/details?id=com.atcnetz.de.ch55xprogrammerV2
i needed to puplish a whole new app because i lost the cert passwort for the old app :D
here is the old one: https://play.google.com/store/apps/details?id=com.atcnetz.de.ch55xprogrammer

I made an auto detect function to recognize the bootloader version and also one for reading, writing or erasing the dataflash

How can i contact you? i dont want to spam the issue threads

another think i found is an firmware readout security risk, you can dump the firmware of the following chips CH551,CH552,CH553,CH554 via the verfiy command, u just need to bruteforce every byte, there is a function in my app to read out the bootloader wich uses this exploit.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions