Logitech Revue has now been hacked. The new hack allows “root” access, thereby allowing anyone to load their own apps into the box and have access to the full filesystem.
The hack uses the Revue’s UART1 port to upload a start-up script. You actually have to solder a set of leads to the mainboard and then connect to the box using a terminal program.
The reason this’s possible is due to the “out of factory” state of the Logitech Revue boxes not disabling the UART port on the board and allowing access to a root shell in recovery mode. After discovering this we were able to reverse the update files and manually upgrade the Revue to most recent update. The attached files are our output of all the effort put forward by our team. Also as a notice to anyone performing the update, we’re not responsible for any harm that may come of your box as an outcome of running our scripts. We’ll attempt to help you with any issues you may experience and have tried to make the process as safe as possible. Also if you’ve any suggestions or ideas on how we can make this process better please feel free to drop by our IRC channel and tell us.
The manual-update.sh script is our attempt at duplicating the process done by the GTV scripts that update the box in recovery mode. There’re also a few miscellaneous tweaks done to assure applications load correctly, backups are made, and that the box doesn’t auto-update. Some portions of the script do things such as flash parts of the NAND so make sure you don’t short circuit your box or accidentally remove power during the manual-update process.
More Info: Full Guide