Payment Terminal Flaw: Hackers Gain Root Access via Hidden Debug Port

A researcher uncovered a critical vulnerability in the Worldline Yomani XR payment terminal, exposing an unsecured root shell via a hidden debug port. Simply connecting a serial cable grants instant root access to the device's Linux-based system (3.6 kernel, Buildroot), allowing attackers to install malware or pivot networks in under a minute. Despite robust physical tamper protections like pressure-sensitive strips and encrypted cores for card handling, this flaw bypasses them entirely, with no evidence of card data theft but significant potential for disruption.


The terminal's design separates an "insecure" core for general operations from a "secure" one for sensitive tasks, but the debug port undermines this. Attackers could use it to manipulate updates or log traffic, posing risks in retail and service environments. Worldline has been notified, and later firmware fixes the issue, but users remain vulnerable until patched.


To protect, merchants should check for the service hatch, request updates, and implement network segmentation. This incident highlights the need for comprehensive security audits on embedded devices to prevent such oversights from becoming gateways for cyber threats.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, Z Plus Security