Direct Messages
rw_vpd
rw_vpd
2/24/2026 6:26 PM
yo
6:26 PM
Yo
con
2/24/2026 6:26 PM
bro
6:26 PM
who are you
6:26 PM
rw_vpd
2/24/2026 6:27 PM
How are you Con
con
2/24/2026 6:27 PM
good
6:27 PM
what's up
rw_vpd
2/24/2026 6:44 PM
Hi con
con
2/24/2026 6:44 PM
do you need help?
rw_vpd
2/24/2026 6:44 PM
I have found kernel version 7 unenrollment via framebuffer
6:44 PM
I would like to discuss?
con
2/24/2026 6:44 PM
sure
rw_vpd
2/24/2026 6:44 PM
Ok.
6:44 PM
Did you know on the framebuffer there is the " frecon" environment?
6:45 PM
Yes there is major vulnerable
6:45 PM
Flaw zone
6:45 PM
See frecon.cc
con
2/24/2026 6:45 PM
yes ik frecon
6:45 PM
rw_vpd
2/24/2026 6:45 PM
It says initialise frecon backend, there is dbus call to freconInit()
con
2/24/2026 6:45 PM
what is the "major vuln"
rw_vpd
2/24/2026 6:45 PM
But not is there minijail
6:45 PM
I have found the code execution in recovery image?
6:45 PM
You are interest?
con
2/24/2026 6:45 PM
yes
6:45 PM
how does it work?
rw_vpd
2/24/2026 6:46 PM
Ok please wait
6:46 PM
Very difficult vulnerability
6:46 PM
Ok firstly.
6:46 PM
Must open shel and type vpd unblock_devmodd=true
1
6:46 PM
Then on the recovery partition layout
con
2/24/2026 6:46 PM
bro
rw_vpd
2/24/2026 6:46 PM
There will be payload.sh
6:46 PM
He's?
con
2/24/2026 6:46 PM
his is not a real vpd value
rw_vpd
2/24/2026 6:46 PM
Make this file
con
2/24/2026 6:46 PM
con
his is not a real vpd value
rw_vpd
2/24/2026 6:46 PM
No no
6:46 PM
Unblock devmodd
6:47 PM
Ok?
6:47 PM
Listen
6:47 PM
This very high priority vuln
con
2/24/2026 6:47 PM
there is literally no mention of this in the source code bro
6:47 PM
this is a lie
rw_vpd
2/24/2026 6:47 PM
When this office press enter developer mode button with cursor in chrome://unenrollment-backend ok?
1
6:47 PM
It will restart
6:47 PM
Red text it will say hello, entering developer mode kind thanks
6:48 PM
And it will say "ComimOS" blue icon
6:48 PM
Ok?
6:48 PM
Are you understanding mam
6:48 PM
Hello
con
2/24/2026 6:48 PM
bro
6:48 PM
this is so fake
rw_vpd
2/24/2026 6:48 PM
Why are you not responding? Major disrespectful to
6:48 PM
Me
con
this is so fake
rw_vpd
2/24/2026 6:48 PM
No
6:48 PM
I have tested
6:49 PM
100 0 vrp money by "buganizer system"
6:49 PM
Ok?
rw_vpd
100 0 vrp money by "buganizer system"
con
2/24/2026 6:49 PM
bro
6:49 PM
rw_vpd
And it will say "ComimOS" blue icon
rw_vpd
2/24/2026 6:49 PM
When this is finish please press power refresh esc in order to enter developer backend tools
6:49 PM
And then press Code execution
1
6:49 PM
From there there is the verified vboot2 and 1 ok?
6:50 PM
Yes
6:50 PM
From there you must time sudo rm -rf vboot
1
6:50 PM
It will delete and then the code exec is attained via framebuf
6:50 PM
We can add this to ". Cosbrknfem"
6:50 PM
"crosbreaker"
6:50 PM
Small development group I am premsume
1
rw_vpd
We can add this to ". Cosbrknfem"
con
2/24/2026 6:51 PM
yes bro we need this wonderful exploit
rw_vpd
2/24/2026 6:51 PM
We can add this please? I have been very excited
con
yes bro we need this wonderful exploit
rw_vpd
2/24/2026 6:51 PM
Ok thannyoh very much maam
rw_vpd
We can add this please? I have been very excited
con
2/24/2026 6:51 PM
yes!
6:51 PM
right away
rw_vpd
2/24/2026 6:51 PM
How we can add this mam
con
2/24/2026 6:51 PM
what is your GitHub so I can add you
(edited)
con
what is your GitHub so I can add you
(edited)
rw_vpd
2/24/2026 6:51 PM
"rw_vpsmd"
6:52 PM
Hi when we will announce this to " Crosbreaker Exploitation Community
con
2/24/2026 6:52 PM
could you please sent me the patch crrev?
rw_vpd
2/24/2026 6:52 PM
No this is not patch
con
2/24/2026 6:52 PM
so I can fully review it
rw_vpd
No this is not patch
con
2/24/2026 6:53 PM
how did you already get paid then
con
2/24/2026 7:01 PM
hello?
7:01 PM
please do not ignore me
7:01 PM
this is mean
Exported 87 message(s)
Timezone: UTC-5