<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Clrokr</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Clrokr"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Clrokr"/>
	<updated>2026-05-01T21:12:21Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:AT%2BXAPP_Vulnerability&amp;diff=16808</id>
		<title>Talk:AT+XAPP Vulnerability</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:AT%2BXAPP_Vulnerability&amp;diff=16808"/>
		<updated>2011-03-14T02:23:47Z</updated>

		<summary type="html">&lt;p&gt;Clrokr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I try to find the xapp command in the disassembly. Is it right that it is in the stack.fls file? I cant find a &amp;quot;xapp&amp;quot; string ... Can someone help me? ~chrisude&lt;br /&gt;
&lt;br /&gt;
In a more general sense I'd like to know the same. As to not being able to find the xapp string, which baseband are you looking at? I can verify that the 05.11.07 baseband does have xapp (at offset 62F5AF, 63B217, 37E4D5 (and xapp_get at 513D18, cmd_xapp.app at 632619). Which you're suppose to look at exactly I'd like to know also.&lt;br /&gt;
So if someone could please give a small intro as to how to find the AT+ commands (main) routine, please fill out. Thanks in advance! ~toomuchjames&lt;br /&gt;
&lt;br /&gt;
Anyone? {{unsigned|toomuchjames|14:18, August 13, 2010 (UTC)}}&lt;br /&gt;
&lt;br /&gt;
Okay so like this can't be real can it? I know it's not relavant to this exploit but I just wanna know.&lt;br /&gt;
http://pastie.org/pastes/1568212 [[User:Leobruh|Leobruh]] 23:20, 24 February 2011 (UTC)!&lt;br /&gt;
&lt;br /&gt;
I know that the BB bootloader signature checks everything on bootup so a permanent unlock is out of discussion. But can this exploit be used with a payload to downgrade the baseband to an older signed version?&lt;/div&gt;</summary>
		<author><name>Clrokr</name></author>
		
	</entry>
</feed>