To Do: The next thing I am working on is my custom web browser based flasher. To deploy the firmware: If you are updating from my previous firmware you only need to perform steps 1, & 4-7. Download and extract the firmware from this post Use the testmode exploit from my first post and then launch telnet Run the following commands to change the root password (non persistent): echo "root:\$1\$quzG9B6u\$qqNRmEdJ0igLcxha0qzp3/:0:0:root:/:/bin/bash" > /etc/passwd.tmp tail -n 14 /etc/passwd >> /etc/passwd.tmp mv /etc/passwd.tmp /etc/passwd chmod a+r /etc/passwd launch your favorite FTP client and connect to 192.168.171.2 using user 'root' and password 'hackedVCM' upload the two firmware files 'mtd4.new' & 'mtd5.new' to the '/tmp' folder Returning to the Telnet session, run the following commands to flash the new recovery firmware: /usr/local/mtd/flash_unlock /dev/mtd4 /usr/local/mtd/flashcp -v /tmp/mtd4.new /dev/mtd4 /usr/local/mtd/flash_unlock /dev/mtd5 /usr/local/mtd/flashcp -v /tmp/mtd5.new /dev/mtd5 Reboot your VCM into recovery (hold the button in while applying power and keep it depressed until the VCM beeps)
duczyk