Skip to content

Unauthorized Access to Wireless Anker Prime Power Bank Through Bluetooth Channel

In the current market, selling power banks presents a challenge due to the limitations on increasing capacity and output wattage. However, a fresh competitor has emerged, introducing 'smart' power banks.

Unauthorized Access and Manipulation of Anker Prime Power Bank Via Bluetooth Connection
Unauthorized Access and Manipulation of Anker Prime Power Bank Via Bluetooth Connection

Unauthorized Access to Wireless Anker Prime Power Bank Through Bluetooth Channel

The world of smart devices has expanded to include power banks, and one such example is the Anker Prime Bluetooth-enabled 27650mAh model. While these devices offer features like real-time stats, smart charging, and even a 'find my power bank' feature, they also raise concerns about potential firmware hacking.

The power bank's internal components include a GD32F303 MCU, a Telink TLSR8253 BLE IC, and a ST7789 LCD. These components enable a range of functionalities, but they also make the device a target for hacking beyond basic battery management system (BMS) features.

Earlier firmware versions (before 1.6.2) of the power bank could be overwritten more easily, but from version 1.6.2 onwards, firmware updates are signed and require a valid signature to install, making unauthorized firmware replacement difficult without exploiting vulnerabilities.

Aaron Christophel, a security researcher, has taken it upon himself to reverse-engineer the communication protocol between the power bank and the Anker app. He has also provided an alternative to the Anker app on the project page. His efforts have revealed that the BLE communication protocol with the official Anker app has been reverse-engineered and open-source alternatives exist, allowing control and data monitoring without the official app.

However, hacking the firmware to add custom functionality beyond battery management (e.g., UPS features, enhanced charging protocols) requires significant hardware reverse engineering, working around cryptographic protections, and a deep understanding of embedded ARM firmware and BLE stacks. Resources including GitHub projects and community videos provide valuable starting points, but any modification carries risk of bricking the device or creating unsafe battery conditions.

One potential exploit could involve hacking the BLE and mobile app features to enable UPS-like functionality, but this would require bypassing cryptographic signature checks and potentially compromising vital battery safety features.

Opening the device is no easy task, as the power bank’s plastic case is tightly sealed and difficult to open without damage. Once opened, the firmware for both MCUs can be dumped from the external flash storage that keeps the firmware update files, although the bootloader itself is protected and stored internally. Despite signature checks for OTA updates, the external flash can potentially be overwritten in parts by exploiting unchecked size variables in the update process.

In conclusion, while hacking the Anker Prime smart power bank is possible, it requires a high level of technical expertise and carries significant risks. Users should be cautious when considering such modifications, as they could potentially disable vital battery safety functions, leading to dangerous conditions.

Read also:

Latest