Difference between revisions of "Netgear WN3000RP"

From Exploitee.rs
Jump to navigationJump to search
(Created page with "__FORCETOC__ {{Disclaimer}} thumb|320px Category:Netgear WN3000RP =Netgear WN3000RP= The Netgear WN3000RP is a wifi range extender which ru...")
 
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
__FORCETOC__
__FORCETOC__
{{Disclaimer}}
{{Disclaimer}}
[[File:NETGEAR_WN3000RP.JPG|thumb|320px]]
[[File:NETGEAR_WN3000RP.JPG|120px|left|thumb]]
[[Category:Netgear WN3000RP]]
[[Category:Networking]]


=Netgear WN3000RP=
=Netgear WN3000RP=
Line 10: Line 10:
"Move around with your mobile devices and keep them connected by giving your existing WiFi coverage a boost. This small, easy-to-install wall-plug WiFi range extender also creates new WiFi connectivity for up to 1 wired device like a Smart TV, Blu-ray player or game console."
"Move around with your mobile devices and keep them connected by giving your existing WiFi coverage a boost. This small, easy-to-install wall-plug WiFi range extender also creates new WiFi connectivity for up to 1 wired device like a Smart TV, Blu-ray player or game console."


[https://www.amazon.com/NETGEAR-Version-Wi-Fi-Extender-WN3000RP/dp/B004YAYM06/ Amazon]
== Purchase ==
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.
[https://www.amazon.com/NETGEAR-Version-Wi-Fi-Extender-WN3000RP/dp/B004YAYM06/ref=as_li_ss_tl?ie=UTF8&qid=1501935929&sr=8-1&keywords=Netgear+WN3000RP&linkCode=ll1&tag=exploiteers-20&linkId=5e5aa8977a10c2751bece1a884efefa8 Purchase the Netgear WN3000RP at Amazon]


 
==Hardware Root==
===UART===
The UART interface on this device is located [pictured], and runs at 57600,8n1. Once the device completes booting, a root shell is executed on the UART TTY. a telnet daemon can be launched by executing '/usr/sbin/telnetd &'
The UART interface on this device is located [pictured], and runs at 57600,8n1. Once the device completes booting, a root shell is executed on the UART TTY. a telnet daemon can be launched by executing '/usr/sbin/telnetd &'


[[File:NETGEAR_WN3000RP_UART.JPG|320px]]
<gallery>
NETGEAR_WN3000RP_UART.JPG
</gallery>


==POC==
===UART Output===
<pre>
<pre>
Miniterm.py -p /dev/ttyUSB0 -b 57600
Miniterm.py -p /dev/ttyUSB0 -b 57600

Latest revision as of 12:27, 5 August 2017

"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."

NETGEAR WN3000RP.JPG

Netgear WN3000RP

The Netgear WN3000RP is a wifi range extender which runs OpenWRT KAMIKAZE on MIPS32.

"Move around with your mobile devices and keep them connected by giving your existing WiFi coverage a boost. This small, easy-to-install wall-plug WiFi range extender also creates new WiFi connectivity for up to 1 wired device like a Smart TV, Blu-ray player or game console."

Purchase

Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device. Purchase the Netgear WN3000RP at Amazon

Hardware Root

The UART interface on this device is located [pictured], and runs at 57600,8n1. Once the device completes booting, a root shell is executed on the UART TTY. a telnet daemon can be launched by executing '/usr/sbin/telnetd &'

UART Output

Miniterm.py -p /dev/ttyUSB0 -b 57600
  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 KAMIKAZE (bleeding edge, r18571) ------------------
  * 10 oz Vodka       Shake well with ice and strain
  * 10 oz Triple sec  mixture into 10 shot glasses.
  * 10 oz lime juice  Salute!
 ---------------------------------------------------
root@WN3000RPv3:/# /usr/sbin/telnetd &