FLASH MTD4&5.txt

(1 KB) Pobierz
To Do:
The next thing I am working on is my custom web browser based flasher.

To deploy the firmware:
If you are updating from my previous firmware you only need to perform steps 1, & 4-7.
Download and extract the firmware from this post
Use the testmode exploit from my first post and then launch telnet
Run the following commands to change the root password (non persistent):
echo "root:\$1\$quzG9B6u\$qqNRmEdJ0igLcxha0qzp3/:0:0:root:/:/bin/bash" > /etc/passwd.tmp
tail -n 14 /etc/passwd >> /etc/passwd.tmp
mv /etc/passwd.tmp /etc/passwd
chmod a+r /etc/passwd
launch your favorite FTP client and connect to 192.168.171.2 using user 'root' and password 'hackedVCM'
upload the two firmware files 'mtd4.new' & 'mtd5.new' to the '/tmp' folder
Returning to the Telnet session, run the following commands to flash the new recovery firmware:
/usr/local/mtd/flash_unlock /dev/mtd4
/usr/local/mtd/flashcp -v /tmp/mtd4.new /dev/mtd4
/usr/local/mtd/flash_unlock /dev/mtd5
/usr/local/mtd/flashcp -v /tmp/mtd5.new /dev/mtd5
Reboot your VCM into recovery (hold the button in while applying power and keep it depressed until the VCM beeps)
Zgłoś jeśli naruszono regulamin