By the way RetrOid nice job on that minimal implementation of pushing the exploit, it cuts out any extra b.s. and just does what's necessary! Your version there is helping me understand how the payload works!
Sometimes I just need a simplified straight to the point version of something to be able to clearly see how it's working.
My post:
Yea that's the thing to be aware of. Not just anything with a usb port will work, it has to have a USB host mode stack, just a client stack is not enough. The
"VoCore2 + USB Header + MicroSD" shown to me by Wierd_w seems like it might do the job, but im still considering my options. If using that I think I would at least need to keep the microsd attached to hold the payload and should hopefully still fit with it (since the 16MB onboard isn't hardly anything). Then solder the usb connection directly (without the header). It even has wifi lol, so should be able to update the payload over wifi if necessary. (once installed would be slightly inconvenient to pop the sdcard for payload updating).
For the SAMD21, yup the data sheet says it:
One full-speed (12Mbps) Universal Serial Bus (USB) 2.0 interface
*Embedded host and device function*
Eight endpoints
The vocore is less explicit about whether it can act in usb host mode or not. But on a vocore wiki page I found this:
"VoCore is a tiny device created by Vonger based on the RaLink RT5350 SOC running at 360MHz. It features 32MB SDRAM, 8MB SPI Flash Interfaces include 802.11bgn, 10/100M Ethernet, USB, UART, I2C, I2S, PCM and JTAG With the optional Dock it can be powered by a MicroUsb Phone charger and has an
USB Host port"
Which says USB Host so I think it does mean host mode support. Actually that looks like the vocore 1 not vocore 2 but if it was in v1 it should still be in the 2nd revision of it.
And anyway why linux? Because penguins... that's why! lol