Skip to content

ZTETool/ZTE-MU5001-HACK

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ZTE-MU5001-HACK

IMPORTANT NOTICE, READ!

Me, the creator of this project managed to fry my router/modem attempting some external antennas, after this I put this project a bit aside, if a saviour would like to contribute to the project we need two things:

  • 1: A list of firmware versions/build/region that work with this code (please comment on this issue: #6)
  • 2: An working iso image extracted with dd and binwalk it so people that has an incompatible firmware can install it as an update and use our exploit.

ABOUT

This fork of ZTE-MU5001-BROWSER-HACK improves front-end menu, documentation regarding available menus, provides the original approach of copy-paste from the V1 and adds a Firefox extension as a V2, the code was also refactored in order to be more readable and make it easier for any further modifications.

INSTALATION

  • For the V1 approach just copy and paste the code from src/hack.js in the browser console as usual(works in any browser). Also can be obfuscated and saved as a favorite as before, but obfuscated version is not released yet.

  • For the V2 approach, go to the releases page, download the xpi file in the assets section, install in your browser, allow incognito if needed. The extension will run automatically when the active tab is http(s)://192.168.0.1/* or http(s)://ufi.ztedevice.com/*.

No support for new browser extensions will be provided as they're more annoying than Firefox to work with and you can just copy and paste it.

If you wish to also install OpenWrt in a raspberry PI to use it as main router and connect the ZTE as a modem check this doc.

FEATURES

New V3.0.4 screenshot

V3.0.4

  • Live metrics
  • All available menus of the router(hidden ones and the regular ones)
  • Hidden actions are listed as a menu item to be more transparent for the user

MANUALLY SIGNING FIREFOX EXT

export MOZILLA_API_KEY="user:333333333:000"
export MOZILLA_API_SECRET=="HUAEHUEHUAEHUAHEUHEAUE"

docker-compose down && docker-compose up --build

# xpi file should be available under src/web-ext-artifacts once the container exits

ROADMAP / TODO

ZTE-MU5001-HACK Kanban

Do you have any idea, suggestions or complaints? Or perhaps found a missing menu item or action? Please open an issue here!

FURTHER RESOURCES

ORIGINAL CREDITS

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • JavaScript 53.3%
  • HTML 18.7%
  • Shell 17.0%
  • CSS 10.1%
  • Dockerfile 0.9%