Rating: 5.0
TLDR: You need to read more than 32 bytes of EEPROM which seems tricky becuase strings are length limited. However, the comparison function doesn't look at the size field of the string and data is not cleared between runs so we can get a string that overlaps old data in SRAM in order to have a much longer string. The exploit is then the same idea as the rev version
[Full writuep](https://ctf.harrisongreen.me/2020/midnightsunctf/avr/)