Get the latest tech news
Hacking Amazon's Eero 6 (part 1)
Hacking the Amazon eero 6 (3rd gen 2020) wireless device, part 1. This part covers device disassembly, identifying pins of interest, brute forcing JTAG pins, and reading serial output.
In this post I will be focusing on device disassembly, identifying pins, brute forcing JTAG, and reading serial output. TypeValue CPU speed 1.2GHz x 4 CPU type Cortex-A53 (Qualcomm IPQ6000) RAM 512MB Storage 4GB Flash (Kingston EMMC04G-M627) Generation Gen 3 Release 2020 WiFi class AX1800 (WiFi 6) Type Extender/Gateway Radios 2 (2.4GHz and 5GHz) BlueTooth 5.0 ZigBee Yes Power 15W (via USB type-C) Before purchasing a device on eBay, I first did a bit of research to find out whether there were any internal device photos available. It supports a broad range of debugger adapters and it’s free, the catch is sometimes it can be a pain to configure, especially when the chip your trying to debug is unknown.
Or read this on Hacker News