Danilo Erazo
Danilo Erazo is an Electronics and Computer Networks Engineer from Ecuador, with extensive experience in developing electronic devices, pentesting, programming education, and infrastructure & security analysis. He is currently focused on conducting independent research in hardware hacking, radio frequency, and car hacking. Danilo also produces and shares reverse engineering content on his YouTube channel @revers3everything. He has been a speaker at major international cybersecurity events, including Hardwear USA 2025, DEFCON 32, Ekoparty 2024, Ekoparty 2023, Bsides Colombia 2024, Nerdearla Chile 2024, a lightning talk at Re//verse conference 2025, Cybercon 2025, and more, where he has presented vulnerabilities discovered through reverse engineering techniques in routers and vehicles.
Danilo holds multiple practical certifications in cybersecurity and computer networks, such as OSWP, CEH, CBP, CCSP, CPAZ, CNSP, CAP, CPNA, CCNA, API Security for Connected Cars and Fleets, and Practical Junior IoT Tester (PJIT), among others. He is a collaborator at the Car Hacking Village at DEFCON and the founder of the Car Hacking Village at Ekoparty. Additionally, he is the founder and creator of Ecuador’s most prominent cybersecurity conference, "PWN OR DIE." You can explore more about his researchs in his blog at: https://revers3everything.com
Session
End-of-life doesn't mean end-of-risk. In this fun and eye-opening talk, we’ll dive into five never-before-seen zero-day vulnerabilities uncovered in widely deployed legacy routers still active in thousands of networks, especially across South America. Using a mix of hardware hacking and binary reversing, you'll see how four of the zero-days were discovered directly through the board using UART and chip-level tactics, while a fifth was revealed by digging into obscure ARCompact binaries.
From discovering Wi-Fi credentials like a boss, to navigating lateral movement between dual SoCs and overcoming tricky UART communication issues, this session is packed with real-world reversing, clever hardware techniques, and lessons for anyone working with embedded devices.
No patches are available, as these routers have reached end-of-life and the vendor will not issue security updates.