You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Used your first blogpost to get root on the previous firmware with the USB symlink trick. After a few months that modem got bricked and I received a new modem with the fixes for that vulnerability so the party was over.
However, i could restore my old config so the ISP never had the chance to upgrade the firmware to protect agains the newer buffer overflows. (bridgemode DSL / no TR-069). Was delighted today hat both your python scripts worked (almost) flawless on V5.50(ABOM.1)D0. It didnt get the root password right but using the oracle fixed that ;)
Thanks a lot for your research!
The text was updated successfully, but these errors were encountered:
Used your first blogpost to get root on the previous firmware with the USB symlink trick. After a few months that modem got bricked and I received a new modem with the fixes for that vulnerability so the party was over.
However, i could restore my old config so the ISP never had the chance to upgrade the firmware to protect agains the newer buffer overflows. (bridgemode DSL / no TR-069). Was delighted today hat both your python scripts worked (almost) flawless on V5.50(ABOM.1)D0. It didnt get the root password right but using the oracle fixed that ;)
Thanks a lot for your research!
The text was updated successfully, but these errors were encountered: