-

Dsl-x1852e Firmware Hot! -

A quick Python script to strip the first 256 bytes gave me a raw TRX image. Then:

| Partition | Size | Purpose | |-----------|--------|-----------------------| | boot | 512KB | CFE bootloader | | firmware | 16MB | Kernel + RootFS | | config | 64KB | NVRAM (settings) | | factory | 64KB | Calibration data (WiFi MAC, board ID) | | log | 512KB | Crash logs (never cleared) | dsl-x1852e firmware

D-Link uses a proprietary header. You can’t just binwalk it and see a squashfs right away. Step 2: The Header Dance Running binwalk -E showed entropy was all over the place—encryption? Compression? Nope. Just a custom header + TRX-style layout. A quick Python script to strip the first

Here’s where it gets interesting. /proc/mtd reveals: Step 2: The Header Dance Running binwalk -E

The config partition uses a custom nvram utility—D-Link’s old-school key-value store. You can read it with /usr/sbin/nvram show . The web UI is served by lighttpd + custom CGI binaries in /www/cgi-bin/ . Most are written in C (not PHP, thankfully).

There’s a special kind of satisfaction in cracking open a router’s firmware before you even plug in the Ethernet cable. Today, we’re looking at the D-Link DSL-X1852E —a VDSL2/ADSL2+ modem-router combo that’s common in European and Asian markets.

Otherwise, at least enable the hidden telnet and run netstat -tulpn to see what’s really listening. Have you looked at the DSL-X1852E firmware yourself? Found anything I missed? Drop a comment or ping me on the forums.


     

Kommentare

Dienstag, 10. April 2018 - Josef Jäggi
mit Ihrem Produkt einverstanden

Neuen Kommentar erfassen

Kommentare werden vor der Freischaltung durch die Redaktion geprüft.
Anti-Spam-Frage Wieviele Zwerge traf Schneewittchen im Wald?
Antwort
Name
E-Mail

Update Alert

Senden Sie mir eine Mail, wenn eine neue Version von CCleaner vorliegt.
Meine Mailadresse  
GOLD SPONSOREN
SPONSOREN & PARTNER