NSLU2-Linux
view · edit · print · history

WRP400.TftpServer History

Hide minor edits - Show changes to markup

February 26, 2009, at 11:40 AM by rwhitby --
Changed lines 8-9 from:

Once you've used the SecretCGICommands to enable the TFTP server, and you've used the ShadowDataHack to temporarily change the protected admin password, then you can start writing files to the device to do certain things:

to:

Once you've used the SecretCGICommands to enable the TFTP server, and you've used the ShadowDataHack to change the protected admin password, then you can start writing files to the device to do certain things:

February 26, 2009, at 11:39 AM by rwhitby --
Changed lines 1-2 from:

To access the built-in TFTP server, you need a TFTP client that can provide a password along with the file write request. Once such client can be found at http://redsand.net/projects/linksys-tftp/linksys-tftp.php for Linux and ftp://ftp.linksys.com/pub/network/tftp.exe for Windows.

to:

Note that the following only applies to the TFTP server built into the 1.00.04 firmware. It seems that the TFTP server in the 1.00.06 firmware requires a full encapsulated image, and therefore is useless for flashing custom firmware (since we don't know how to rebuild a full encapsulated image with it's cryptographic hash).

So to use the instructions below, you need to reflash your router with 1.00.04 firmware first.

To access the built-in TFTP server, you need a TFTP client that can provide a password along with the file write request. Once such client can be found at http://redsand.net/projects/linksys-tftp/linksys-tftp.php for Linux and ftp://ftp.linksys.com/pub/network/tftp.exe for Windows.

February 25, 2009, at 01:28 PM by rwhitby --
Changed lines 13-14 from:

Note that since we don't yet know how to rebuild an image file with modified contents, this is currently only useful for burning image files extracted from official firmware upgrade images.

to:

This facility can be used to write modified images to the device.

February 25, 2009, at 01:26 PM by rwhitby --
Added lines 13-14:

Note that since we don't yet know how to rebuild an image file with modified contents, this is currently only useful for burning image files extracted from official firmware upgrade images.

February 25, 2009, at 01:23 PM by rwhitby --
Changed lines 1-2 from:

To access the built-in TFTP server, you need a TFTP client that can provide a password along with the file write request. Once such client can be found at http://redsand.net/projects/linksys-tftp/linksys-tftp.php

to:

To access the built-in TFTP server, you need a TFTP client that can provide a password along with the file write request. Once such client can be found at http://redsand.net/projects/linksys-tftp/linksys-tftp.php for Linux and ftp://ftp.linksys.com/pub/network/tftp.exe for Windows.

Changed lines 7-8 from:
to:

The TFTP server accepts a number of image files, determined by the correct content of the image file. The files that have been tested so far are:

 cybertan_half_image

 cybertan_full_image
July 09, 2008, at 07:20 AM by rwhitby --
Added lines 1-17:

To access the built-in TFTP server, you need a TFTP client that can provide a password along with the file write request. Once such client can be found at http://redsand.net/projects/linksys-tftp/linksys-tftp.php

Once you've used the SecretCGICommands to enable the TFTP server, and you've used the ShadowDataHack to temporarily change the protected admin password, then you can start writing files to the device to do certain things:

  • image files
  • passwd.txt
 @<UPGRADE_DOWNLOAD_START>@@
 Write passwd start
 ###################################
 # Error: Write passwd failed. #
 ###################################
view · edit · print · history · Last edited by rwhitby.
Originally by rwhitby.
Page last modified on February 26, 2009, at 11:40 AM