{"id":2878,"date":"2026-05-08T16:50:07","date_gmt":"2026-05-08T08:50:07","guid":{"rendered":"https:\/\/blog.md5.red\/?p=2878"},"modified":"2026-05-08T16:57:16","modified_gmt":"2026-05-08T08:57:16","slug":"cve-2025-26637-pcileech%e5%8d%87%e7%ba%a7%e7%89%88","status":"publish","type":"post","link":"https:\/\/blog.md5.red\/?p=2878","title":{"rendered":"CVE-2025-26637 PCILeech\u5347\u7ea7\u7248"},"content":{"rendered":"\n<p>\u5047\u8bbe\u5df2\u7ecf\u83b7\u53d6BIOS\u5bc6\u7801<\/p>\n\n\n\n<p>\u53ef\u4ee5\u5173\u95ed\u865a\u62df\u5316\uff0c\u4e0d\u4f1a\u89e6\u53d1Bitlocker\u6062\u590d\u5bc6\u94a5<\/p>\n\n\n\n<p>\u4e0d\u80fd\u76f4\u63a5\u5173\u95edDMA\u4fdd\u62a4\uff0c\u4f1a\u89e6\u53d1Bitlocker\u6062\u590d\u5bc6\u94a5<\/p>\n\n\n\n<p>\u901a\u8fc7\u4fee\u6539\u786c\u4ef6ID\u7ed5\u8fc7\u786c\u4ef6\u767d\u540d\u5355<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u53c2\u8003\uff1a<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Pierre-Nicolas Allard-Coutu - Stolen Laptops   A brief overview of modern physical access attacks\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/A5v67H7s0-8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>\u5047\u8bbe\u5df2\u7ecf\u83b7\u53d6BIOS\u5bc6\u7801 \u53ef\u4ee5\u5173\u95ed\u865a\u62df\u5316\uff0c\u4e0d\u4f1a\u89e6\u53d1Bitlocker\u6062\u590d\u5bc6\u94a5 \u4e0d\u80fd\u76f4\u63a5\u5173\u95edDMA\u4fdd\u62a4\uff0c\u4f1a\u89e6\u53d1B ...<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2878","post","type-post","status-publish","format-standard","hentry","category-1"],"_links":{"self":[{"href":"https:\/\/blog.md5.red\/index.php?rest_route=\/wp\/v2\/posts\/2878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.md5.red\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.md5.red\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.md5.red\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.md5.red\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2878"}],"version-history":[{"count":3,"href":"https:\/\/blog.md5.red\/index.php?rest_route=\/wp\/v2\/posts\/2878\/revisions"}],"predecessor-version":[{"id":2882,"href":"https:\/\/blog.md5.red\/index.php?rest_route=\/wp\/v2\/posts\/2878\/revisions\/2882"}],"wp:attachment":[{"href":"https:\/\/blog.md5.red\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.md5.red\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.md5.red\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}