To secure the world

DEVCORE has been researching the most forward-looking cybersecurity techniques and attack trends. We utilize our experience to enhance Red Team Assessment, thereby assisting enterprises in recognizing the latest attack trends.

Research the most forward-looking cybersecurity techniques

We have been researching leading and influential network software, devices, and systems such as Microsoft Exchange, Pulse Secure, Fortinet, Palo Alto, and Jenkins.

Develop extensive cyber attack skills

No matter if it is Pwn, Reverse, Web, or even Crypto, all are DEVCORE's specialties. Moreover, we are capable of combining common failures into critical vulnerabilities.

Research service

Provide full stack product security assessment to identify potential intrusion methods comprehensively, including DMA Attack Assessment, Hardware Analysis, Firmware Analysis, Firmware Decryption, and Hardware Encrypted Storage Analysis.


Orange Tsai

Principal Security Researcher


Senior Security Researcher


Security Researcher

Research Findings

Tech Editorials #Advisory #CVE #RCE #Exchange #SSRF

A New Attack Surface on MS Exchange Part 1 - ProxyLogon!

Orange Tsai


Microsoft Exchange, as one of the most common email solutions in the world, has become part of the daily operation and secure connection for governments and enterprises. This January, we reported a series of vulnerabilities of Exchange Server to Microsoft and named it as ProxyLogon. ProxyLogon might be the most severe and impactful vulnerability in the Exchange history ever. If you were paying attention to the industry news, you must have heard it.

Tech Editorials #RCE #NAS #IoT

Your NAS is not your NAS !



Two years ago, we found a critical vulnerability, CVE-2021-31439, on Synology NAS. This vulnerability can let an unauthorized attacker gain code execution on a remote Synology DiskStation NAS server. We used this vulnerability to exploit Synology DS418play NAS in Pwn2Own Tokyo 2020. After that, we found the vulnerability exists not only on Synology but also on most NAS vendors. Following, we will describe the details and how we exploit it.

Tech Editorials #Advisory #CVE #RCE #Facebook #BugBounty

How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM

Orange Tsai


Hi, it's a long time since my last article. This new post is about my research this March, which talks about how I found vulnerabilities in a leading Mobile Device Management product and bypassed several limitations to achieve unauthenticated RCE. All the vulnerabilities have been reported to the vendor and got fixed in June. After that, we kept monitoring large corporations to track the overall fixing progress and then found that Facebook didn't keep up with the patch for more than 2 weeks, so we dropped a shell on Facebook and reported to their Bug Bounty program!