1 Star 0 Fork 0

muwanqing123 / OpenWRTInvasion

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
贡献代码
同步代码
取消
提示: 由于 Git 不支持空文件夾,创建文件夹后会生成空的 .keep 文件
Loading...
README

Root shell exploit for several Xiaomi routers: 4A Gigabit, 4A 100M, 4C, 3Gv2, 4Q, miWifi 3C...

How to run

NOTE: FROM VERSION 0.0.2 THE ROUTER NEEDS INTERNET ACCESS. If you require to run the exploit without internet access please try version 0.0.1. Find the versions here: https://github.com/acecilia/OpenWRTInvasion/releases

pip3 install -r requirements.txt # Install requirements
python3 remote_command_execution_vulnerability.py # Run the script

You will be asked for the router IP address and for the stok. You can grab the stok from the router URL after you log in to the admin interface:

After that, a telnet server will be up and running on the router. You can connect to it by running:

telnet <router_ip_address>
  • User: root
  • Password: root

The script also starts an ftp server at port 21, so you can get access to the filesystem using a GUI (for example cyberduck).

Supported routers and firmware versions

  • MiRouter 4A Gigabit: user ksc91u claims that this method also works on firmware version 2.28.62 and 2.28.132: OpenWrt forum. It is also working on the latest 3.0.24 firmware: OpenWrt forum.
  • MiRouter 4A 100M (non gigabit): user morhimi claims that this method works on firmware version 2.18.51: OpenWrt forum. User Jeffpeng claims that this method works on firmware version 2.18.58: OpenWrt forum.
  • MiRouter 4C: user Jeffpeng claims that this method works on firmware version 2.14.81: OpenWrt forum.
  • Mi Router 3Gv2: user Massimiliano Mangoni claims that this method also works on firmware version 2.28.8 (message posted in Slack).
  • Mi Router 4Q (aka R4C): user cadaverous claims that this method also works on firmware version 2.28.48 (message posted in Slack), but because the router is mips architecture (not mipsel), he needed to use version 0.0.1 of the script (the other versions use a busybox binary built for the mipsel architecture that is used to start a telnet sever).
  • MiWifi 3C: works on firmware versions 2.9.217, 2.14.45 and 2.8.51_INT: OpenWrt forum, OpenWrt forum.
  • Mi Router 4: user Firef0x claims that exploit version 0.0.1 works on firmware version 2.26.175.
  • Xiaomi Mi R3P: user lukasz1992 claims that the exploit works with the Xiaomi Dev firmware.

Not supported

Xiaomi 4A Gigabit Global Edition

Firmwares

This repository contains the following firmwares:

If you have a pending update in your Xiaomi stock firmware, you can check its md5 hash and the download url by navigating to:

http://192.168.31.1/cgi-bin/luci/;stok=<stok>/api/xqsystem/check_rom_update

Install OpenWrt

When installing OpenWrt on the Xiaomi 4A Gigabit, there are several options. Note that there isn't a stable release for it yet, which means that the firmware may be unstable:

  • The latest snapshot from OpenWrt: https://downloads.openwrt.org/snapshots/targets/ramips/mt7621/openwrt-ramips-mt7621-xiaomi_mir3g-v2-squashfs-sysupgrade.bin

  • Use a prebuilt image I created myself on 06-06-2020 using imagebuilder. The image is hosted in this repository:

    • Link: https://raw.githubusercontent.com/acecilia/OpenWRTInvasion/master/firmwares/OpenWrt/06-06-2020/openwrt-ramips-mt7621-xiaomi_mir3g-v2-squashfs-sysupgrade.bin
    • sha: 83feed9ff633863acb1f14b61c30029b924fec252c1ed1e4de2a909e52b2d872
  • Build your own image with imagebuilder, using the latest source code on master:

    docker pull openwrtorg/imagebuilder:ramips-mt7621-master
    docker run --rm -v "$(pwd)"/bin/:/home/build/openwrt/bin -it openwrtorg/imagebuilder:ramips-mt7621-master
    make PROFILE=xiaomi_mir3g-v2 image
  • Other images provided by OpenWrt users (at your own risk): OpenWrt forum

  • Wait until there is a stable release of OpenWrt

If after reading above text you still want to proceed, after login to the router through telnet run the following commands:

cd /tmp
curl https://raw.githubusercontent.com/acecilia/OpenWRTInvasion/master/firmwares/OpenWrt/06-06-2020/openwrt-ramips-mt7621-xiaomi_mir3g-v2-squashfs-sysupgrade.bin --output firmware.bin # Put here the URL you want to use to download the firmware
./busybox sha256sum firmware.bin # Verify the firmware checksum before flashing, very important to avoid bricking your device!
mtd -e OS1 -r write firmware.bin OS1 # Install OpenWrt

This will install the snapshot version of OpenWrt (without Luci). You can now use ssh to connect to the router (and install Luci if you prefer it).

Performance:

Some users have reported worse WIFI performance in OpenWrt than in the stock firmware. See the following links:

For more info and support go to:

If you brick your device

You can find solutions in the following links:

Acknowledgments

  • Original vulnerabilities and exploit: UltramanGaia
  • Instructions to install OpenWrt after exploit execution: rogerpueyo
  • Testing and detailed install instructions: hey07
  • Checking the URL of pending updates: sicklesareterrible

Demo

Version 0.0.2 and higher: telnet

Alt Text

Version 0.0.1: netcat (legacy)

Alt Text

空文件

简介

暂无描述 展开 收起
取消

发行版

暂无发行版

贡献者

全部

近期动态

加载更多
不能加载更多了
1
https://gitee.com/mitbook/OpenWRTInvasion.git
git@gitee.com:mitbook/OpenWRTInvasion.git
mitbook
OpenWRTInvasion
OpenWRTInvasion
master

搜索帮助