Get the latest tech news
Magic Leap One Bootloader Exploit
An exploit chain for the Magic Leap One (and probably other TX2 devices) - EliseZeroTwo/ml1hax
The fastbootrs folder contains a Rust implementation of a Fastboot client, and is the code that runs on the host. Code Execution in CBoot over Fastboot USB by smashing the stack in NVidia's SparseFS parser ( sparsehax) Overwriting CBoot in memory using an oversized kernel-dtb implementation on the storage to gain persistant code execution ( dtbhax) I've not researched it much but there's a decent chance the kernel-dtb vuln can be used for persistence on the Autopilot units of certain cars using the TX2.
Or read this on Hacker News