Document Title: =============== Banana PI Lamobo R1 SD v3 - New Universal Router Case References: =========== https://www.vulnerability-lab.com/get_content.php?id=2140 Download: https://www.vulnerability-lab.com/resources/documents/2140.rar Vulnerability Magazine: https://www.vulnerability-db.com/?q=articles/2018/07/24/new-banana-pi-r1-sd-v3-case-devs-pentesters-available Release Date: ============= 2018-07-23 Vulnerability Laboratory ID (VL-ID): ==================================== 2140 Vulnerability Disclosure Timeline: ================================== 2018-07-24: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Tutorial Severity Level: =============== Medium Technical Details & Description: ================================ The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating systems such as OpenWrt, Android and Bananian. The R1 has a slim router form factor with a bay for 2.5 hard drives. It also has 4 Gigabit LAN ports, 1 Gigabit WAN and 300Mbs Wireless N capabilities. Banana Pi is an open platform device, it is for everyone who wants to play and build with developer technology instead of just working with consumer technology. Supported by our community it is fun to start a project and build servers. We welcome all companies, DIY enthusiasts and technology enthusiasts to our community! Together we can make a difference, discover our passions, inspire others and build a practical project. In recent months we have received several requests from pentesters and developers to create a universal case. Thanks to the efforts of one of our developers, the case can now be produced free of charge in PLA or ABS with a 3d printer or makerbot. Our developer took the trouble to create the router in 3 matching parts. Feel free to download and share the latest version with the stl files and editable plans. Credits & Authors: ================== Vulnerability Laboratory [Core Research Team] (research@vulnerability-lab.com) Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@ or research@) to get a ask permission. Copyright © 2018 | Vulnerability Laboratory - [Evolution Security GmbH]™