diff options
author | Pietro Ameruoso <42093926+pameruoso@users.noreply.github.com> | 2023-04-27 16:14:34 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-04-27 16:14:34 +0200 |
commit | 3d1f1a1df90cabdb80b04882c8a7036bd58bda25 (patch) | |
tree | ae7409f0aeab078255cdddb6676bdbdfdd832cc2 | |
parent | Update zyxel guidance (#190) (diff) | |
download | hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.tar hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.tar.gz hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.tar.bz2 hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.tar.lz hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.tar.xz hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.tar.zst hack-gpon.github.io-3d1f1a1df90cabdb80b04882c8a7036bd58bda25.zip |
-rw-r--r-- | _sfp_cage/zyxel.md | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/_sfp_cage/zyxel.md b/_sfp_cage/zyxel.md index 9259f14..f0ce55b 100644 --- a/_sfp_cage/zyxel.md +++ b/_sfp_cage/zyxel.md @@ -101,7 +101,7 @@ You have successfully unlocked zloader access, this procedure must be done only ### Dump supervisor password {% include alert.html content="The following procedure is provided as-is, if you damage the device this community is not responsibile of it in any way." alert="Warning" icon="svg-warning" color="red" %} -{% include alert.html content="The supervisor user is the most powerful user that can be used from the web interface. The supervisor password is written in the nand and it's encrypted. To dump the password you must first complete the "Unlock zloader" procedure" alert="Info" icon="svg-info" color="blue" %} +{% include alert.html content='The supervisor user is the most powerful user that can be used from the web interface. The supervisor password is written in the nand and it's encrypted. To dump the password you must first complete the "Unlock zloader" procedure' alert="Info" icon="svg-info" color="blue" %} 1. Open the router case and connect your usb to serial adapter. 2. Open putty or any other serial capable software and configure it to use your COMX port with 115200 speed. @@ -121,7 +121,7 @@ atsr {% include alert.html content="The following procedure is provided as-is, if you damage the device this community is not responsibile of it in any way." alert="Warning" icon="svg-warning" color="red" %} -{% include alert.html content="To swap the boot partition you first have to complete the Unlock zloader procedure" alert="Info" icon="svg-info" color="blue" %} +{% include alert.html content='To swap the boot partition you first have to complete the "Unlock zloader" procedure' alert="Info" icon="svg-info" color="blue" %} 1. Open the router case and connect your usb to serial adapter. 2. Open putty or any other serial capable software and configure it to use your COMX port with 115200 speed. @@ -142,7 +142,7 @@ cat /proc/cmdline ## Unlock u-boot access {% include alert.html content="The following procedure is provided as-is, if you damage the device this community is not responsibile of it in any way." alert="Warning" icon="svg-warning" color="red" %} -{% include alert.html content="To unlock u-boot access you first have to complete the Unlock zloader procedure" alert="Info" icon="svg-info" color="blue" %} +{% include alert.html content='To unlock u-boot access you first have to complete the "Unlock zloader" procedure' alert="Info" icon="svg-info" color="blue" %} {% include alert.html content="Having full u-boot access can be very dangerous, with great power comes great responsibility." alert="Warning" icon="svg-warning" color="red" %} @@ -172,7 +172,7 @@ MT7986> {% include alert.html content="The following procedure is provided as-is and if anything goes wrong you will likely need to open the router case and attach a USB serial adapter to the router to recover it. This community is not responsible of any damage you cause by following these procedures." alert="Warning" icon="svg-warning" color="red" %} -1. access via ssh to the router with admin user (admin password is printed on the back of the router). +1. access via ssh or telnet to the router with admin user (admin password is printed on the back of the router). 2. Disable firmware version check and model check by running the following commands. ``` zycli fwidcheck off |