Netgear WN3000RP

From Exploitee.rs
Jump to navigationJump to search

"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."

NETGEAR WN3000RP.JPG

Netgear WN3000RP

The Netgear WN3000RP is a wifi range extender which runs OpenWRT KAMIKAZE on MIPS32.

"Move around with your mobile devices and keep them connected by giving your existing WiFi coverage a boost. This small, easy-to-install wall-plug WiFi range extender also creates new WiFi connectivity for up to 1 wired device like a Smart TV, Blu-ray player or game console."

Purchase

Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device. Purchase the Netgear WN3000RP at Amazon

Hardware Root

The UART interface on this device is located [pictured], and runs at 57600,8n1. Once the device completes booting, a root shell is executed on the UART TTY. a telnet daemon can be launched by executing '/usr/sbin/telnetd &'

UART Output

Miniterm.py -p /dev/ttyUSB0 -b 57600
  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 KAMIKAZE (bleeding edge, r18571) ------------------
  * 10 oz Vodka       Shake well with ice and strain
  * 10 oz Triple sec  mixture into 10 shot glasses.
  * 10 oz lime juice  Salute!
 ---------------------------------------------------
root@WN3000RPv3:/# /usr/sbin/telnetd &