0-Click RCE in the SuperNote Nomad E-ink Tablet Lets Hackers Install Rootkit & Gain Full Control

Security researcher Prizm Labs has discovered a serious flaw in the [SuperNote A6 X2 Nomad](https://supernote.com/products/supernote-nomad?srsltid=AfmBOopLgaV2qunWCtee8RMx9v9JFYRiRaqOoXDV5_o4zJyKxCUbrikG), a well-known 7.8-inch E-Ink tablet made by Ratta Software.The flaw, now assigned [CVE-2025-32409](https://nvd.nist.gov/vuln/detail/CVE-2025-32409), could allow a malicious attacker on the same network to fully compromise the device without any user interaction, potentially installing a rootkit that grants complete control.The discovery, detailed technical analysis highlights significant security oversights in the tablet’s design, raising concerns for users who rely on the device for note-taking and academic work.**A Hacker’s Curiosity Sparks Discovery**—————————————–Researcher launched an initial Nmap scan revealed an open port 60002 running an unidentified service, prompting further investigation. ![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPiQjD8Z1lzoisLskeHjKPve8dPstK3KaqPO_qyoWZBLwwAgIpbVOM7-Rvkd_U_xVEXPMNruk6kh-11JH5TULTI1K6DN2DHlzbTbfAjcTuWwWCHazJQ-ckRyiYJf5QBalhwhM2LSCKZteX8-KUinMLX6oI0wKK64qJU17qlwcqQVoo0wO_0Mn2Q02gK-VK/s16000/82b748_dad176ba78834c66a13db5c0bd162004~mv2.png)By downloading an unencrypted firmware image from Ratta Software’s update page, Maginnes was able to dissect the tablet’s software. The investigation zeroed in on the *SuperNoteLauncher.apk*, which contained references to the mysterious port.Using reverse-engineering tools like *jadx*, Maginnes traced the port to a custom HTTP server embedded in the app, designed to handle device-to-device file sharing over Wi-Fi.**A Chain of Exploitable Flaws**——————————–The server on port 60002 was found to process custom HTTP headers, enabling unauthenticated file uploads to the device’s *INBOX* directory.
Maginnes tested the system’s limits by attempting a path traversal attack, appending ‘dot-dot-slashes’ (e.g., *../../../../sdcard/EXPORT/testfile.txt*) to the file path.The attack succeeded, allowing files to be written to the *EXPORT* directory, which is accessible via the tablet’s user interface.However, the exploit hit a snag: the server appended a ‘(1)’ to filenames if a file already existed, resulting in names like *update(1).zip*.This was problematic because the tablet’s firmware update process, which scans the *EXPORT* directory for updates, required a file named exactly *update.zip* to trigger an installation.**Turning a Misconfiguration Into a Full-Blown Exploit**——————————————————–Researcher devised an ingenious workaround by exploiting the server’s multi-threaded nature and the time it takes to transfer large files. The tablet’s firmware update files are typically 1.1GB, meaning uploads are slow.By sending a small ‘dummy’ file named *update.zip* followed immediately by a malicious *update.zip* containing a backdoor, Maginnes manipulated the server’s file-handling logic.The dummy file completed its transfer first, freeing up the *update.zip* name just in time for the malicious file to claim it during the copy process.The malicious firmware was signed using publicly available debug keys, a flaw carried over from earlier SuperNote models, as noted in prior research.According to the [report](https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet), These keys, combined with an unlocked bootloader, allowed the backdoored firmware to pass verification. Once in the *EXPORT* directory, the firmware would install automatically during a hotplug event (e.g., connecting a USB-C cable) or a reboot.While users receive an opt-out prompt during a hotplug event, the update installs after 30 seconds unless manually canceled—a low barrier for an unsuspecting user.**Crafting the Attack**———————–To create the malicious firmware, Maginnes used a flashable Android rootkit and a simple C-based reverse shell payload. Repackaging the firmware required *Multi Image Kitchen*, though compatibility issues with modern Java Development Kits (JDKs) posed a challenge.Once installed, the rootkit granted full control over the device, potentially exposing sensitive user data like notes, documents, or academic papers.**Implications and Response**—————————–This 0-click remote code execution (RCE) vulnerability underscores the risks of unauthenticated network services and lax firmware security in IoT devices. An attacker on the same Wi-Fi network such as in a coffee shop, library, or office could silently compromise a SuperNote Nomad without the user’s knowledge.The use of outdated debug keys and an unlocked bootloader further amplifies the severity of the issue.Ratta Software has not yet issued a public statement regarding the vulnerability. Users are advised to disable Wi-Fi on their SuperNote Nomad when not in use and avoid connecting to untrusted networks until a patch is released.Maginnes disclosed the issue responsibly, and the assignment of a CVE number suggests that a fix may be in progress.**Find this News Interesting! Follow us on [Google News](https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&gl=IN&ceid=IN:en), [LinkedIn](https://www.linkedin.com/company/cybersecurity-news/), -& [X](https://x.com/The_Cyber_News) to Get Instant Security News Updates!**The post [0-Click RCE in the SuperNote Nomad E-ink Tablet Lets Hackers Install Rootkit -& Gain Full Control](https://cybersecuritynews.com/0-click-rce-in-the-supernote-nomad-e-ink-tablet/) appeared first on [Cyber Security News](https://cybersecuritynews.com).

Related Tags:
NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 335 – Electrical Equipment

Appliance

Component Manufacturing

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 33 – Manufacturing – Metal

Electronics And Other

Blog: Cybersecurity News

Software Discovery: Security Software Discovery

Software Discovery

Exploitation for Client Execution

Network Service Discovery

Associated Indicators: