Flipper Zero: TagTinker overwrites digital price tags via infrared

Flipper Zero: TagTinker Overrides Digital Price Tags via Infrared

Electronic shelf labels (ESLs), also known as digital price tags, have become a staple in modern retail environments. These battery-powered displays allow stores to update prices remotely, reducing labor costs and minimizing errors associated with manual pricing. However, a recent demonstration highlights a significant security vulnerability: these devices can be manipulated using inexpensive hardware and custom software. The Flipper Zero, a versatile portable multi-tool popular among security researchers and penetration testers, paired with the TagTinker application, enables users to intercept, decode, and alter price information transmitted via infrared (IR) signals.

Understanding Electronic Shelf Labels

ESLs typically consist of e-ink displays powered by small batteries, designed to last several years. They communicate with central management systems through infrared signals, a technology borrowed from remote controls. This wireless method allows for quick updates across aisles without extensive wiring. Major manufacturers like Hanshow, Ynvisible, and Pricer dominate the market, with devices varying slightly in protocol but sharing a common weakness: lack of authentication.

In retail settings, base stations mounted on shelves or ceilings broadcast IR commands to synchronize prices, inventory data, or promotional messages. The process is one-way; tags do not confirm receipt, relying instead on signal strength and repetition for reliability. This simplicity, while efficient, exposes the system to interference.

The Flipper Zero: A Pentesting Powerhouse

The Flipper Zero is a compact, open-source device resembling a retro game console, equipped with modules for RFID, NFC, sub-GHz radio, GPIO pins, and crucially, an infrared transceiver. Priced under 200 euros, it runs custom firmware that supports a growing ecosystem of applications developed by its community. Its portability—fitting in a pocket—and user-friendly interface make it ideal for on-site testing.

For ESL manipulation, Flipper Zero’s IR capabilities are key. The device can capture raw IR signals, analyze their modulation, and replay or modify them. This functionality stems from its ability to emulate universal remotes, a feature extended through community apps.

TagTinker: Decoding and Rewriting IR Protocols

Enter TagTinker, a Flipper Zero application developed by GitHub user “flipperdevices” contributor and security enthusiast. Released in late 2023, TagTinker reverse-engineers IR protocols used by ESLs from multiple vendors. It supports brands including Hanshow (models ES-Handy, Quick, Ultra), Ynvisible, and others, with ongoing updates for additional protocols.

The app’s workflow is straightforward yet powerful:

  1. Signal Capture: Point the Flipper Zero at an active ESL during a price update. The device records the IR burst, typically a series of pulses at 38 kHz carrier frequency modulated with data.

  2. Protocol Analysis: TagTinker decodes the captured signal, displaying fields such as device ID, price value (in cents), currency code, and flags for promotions or inventory. For instance, a Hanshow tag might encode a price of 19.99 euros as hexadecimal values representing 1999 cents.

  3. Modification: Users edit parameters via the Flipper’s screen or qFlipper desktop app. Prices can be inflated (e.g., from 19.99 to 99.99 euros) or deflated, shelf locations altered, or promotional flags toggled.

  4. Transmission: The modified signal is rebroadcast toward the target tag. ESLs lack encryption or rolling codes, so validly formatted commands are accepted without verification.

Demonstrations show real-world efficacy. In a video walkthrough, a researcher captures a legitimate update on a Hanshow ES-Handy tag displaying 19.99 euros, modifies it to 99.99 euros, and retransmits. The tag refreshes almost instantly, showing the new price. Similar success occurs with Ynvisible tags, where battery status and product codes are also tampered with. Range is limited to line-of-sight, typically 1-5 meters, but repetition ensures reliability.

Technical Deep Dive

IR protocols for ESLs use Manchester encoding or similar for data robustness. A typical frame includes:

  • Preamble: Synchronization pulses.

  • Header: Vendor-specific identifier.

  • Payload: Price (4-8 bytes), tag ID (unique per device), timestamp or sequence.

  • Checksum: Simple CRC for error detection, easily recomputed.

TagTinker’s source code, available on GitHub, implements protocol parsers for each vendor. For Hanshow, it handles variants like Quick and Ultra, accommodating differences in payload length and encoding. The app integrates with Flipper’s IR library, supporting sub-1kHz to 56 kHz frequencies.

Firmware requirements include the RogueMaster or Xtreme editions, which unlock advanced IR features. Installation via qFlipper is recommended for stability.

Security Implications for Retail

This vulnerability underscores broader issues in IoT deployments. ESLs prioritize cost and battery life over security, omitting mutual authentication, encryption, or anti-replay measures. An attacker in a store could deploy scripts for mass updates, potentially causing checkout discrepancies, inventory chaos, or reputational damage.

Manufacturers have been notified; Hanshow acknowledged the issue but cited physical proximity as mitigation. Critics argue this dismisses remote base station risks—capturing legitimate signals from afar and replaying selectively. No patches are confirmed, as many systems predate modern security standards.

For retailers, recommendations include:

  • Segregating base stations to limit broadcast range.

  • Monitoring for anomalous tag behavior via management software.

  • Transitioning to Bluetooth Low Energy (BLE) or Zigbee ESLs with better security.

Researchers emphasize ethical use: TagTinker is for awareness and authorized testing, not mischief.

Broader Context in IT Security

This case exemplifies “low-hanging fruit” in supply chain security. As ESLs proliferate—projected to equip 20% of global shelves by 2025—such exploits highlight the need for protocol hardening. Flipper Zero’s role accelerates disclosure, pressuring vendors toward secure-by-design principles.

In summary, TagTinker transforms Flipper Zero into an ESL auditing tool, exposing unencrypted IR communications. Retailers must weigh convenience against risks, while the security community gains another vector for education.

Gnoppix is the leading open-source AI Linux distribution and service provider. Since implementing AI in 2022, it has offered a fast, powerful, secure, and privacy-respecting open-source OS with both local and remote AI capabilities. The local AI operates offline, ensuring no data ever leaves your computer. Based on Debian Linux, Gnoppix is available with numerous privacy- and anonymity-enabled services free of charge.

What are your thoughts on this? I’d love to hear about your own experiences in the comments below.