Advertisement
Australia markets closed
  • ALL ORDS

    7,817.40
    -81.50 (-1.03%)
     
  • ASX 200

    7,567.30
    -74.80 (-0.98%)
     
  • AUD/USD

    0.6420
    -0.0005 (-0.08%)
     
  • OIL

    82.98
    +0.25 (+0.30%)
     
  • GOLD

    2,399.60
    +1.60 (+0.07%)
     
  • Bitcoin AUD

    101,280.83
    +4,085.45 (+4.20%)
     
  • CMC Crypto 200

    1,332.87
    +20.24 (+1.57%)
     
  • AUD/EUR

    0.6017
    -0.0014 (-0.23%)
     
  • AUD/NZD

    1.0886
    +0.0011 (+0.10%)
     
  • NZX 50

    11,796.21
    -39.83 (-0.34%)
     
  • NASDAQ

    17,329.20
    -65.11 (-0.37%)
     
  • FTSE

    7,845.10
    -31.95 (-0.41%)
     
  • Dow Jones

    37,934.90
    +159.52 (+0.42%)
     
  • DAX

    17,740.23
    -97.17 (-0.54%)
     
  • Hang Seng

    16,224.14
    -161.73 (-0.99%)
     
  • NIKKEI 225

    37,068.35
    -1,011.35 (-2.66%)
     

Roku jailbreak gives users control over what channels they install

Roku has responded, saying the RootMyRoku vulnerabilities are now mitigated in its v9.4 software

What Hi-Fi Magazine via Getty Images

It's been years since the GTV Hacker team revealed a method to get root access on Roku devices, but now they operate under the Exploitee.rs banner and once again point out a software crack for the streaming hardware.

According to RootMyRoku developer llamasoft, the exploit takes advantage of a pair of vulnerabilities to enable a persistent root jailbreak. It should work on RokuOS v9.4.0 with the Realtek WiFi chip, which includes "almost all" Roku TVs and some of the boxes. RokuOS 10 blocks this particular method, but you may not have received the update yet.

Obviously this is useful for enthusiasts wanting more control of their box, but it does present some security issues, and on the Github page, the developer pleads with Roku to follow the lead of other companies in creating a bug bounty program. That would pay people who find these exploits, giving them more of a reason to find and highlight them so they can be fixed, rather than enabling any kind of nefarious activity.

ADVERTISEMENT

Update (5/18): Roku has replied with a statement, noting that customer data has not been exposed and the company also says it has mitigated the vulnerabilities in devices running Roku OS 9.4 as well.

As part of our continuous monitoring, the Roku security team identified and addressed vulnerabilities in the Roku OS – though these vulnerabilities did not expose customer data and we did not identify any malicious activity. We always want to do everything we can to maintain a secure environment for Roku, our partners, and our users, and we therefore mitigated the vulnerabilities and updated Roku OS 9.4 with no impact to the end user experience.