Anime4000 / RTL960x

Hacking V2801F, TWCGPON657 & DFP-34X-2C2 GPON ONU SFP Stick to suite your ISP Fiber
The Unlicense
617 stars 110 forks source link

Security Assessment of ODI DFP-34X-2C2 Device #262

Open Dmitrizam opened 6 months ago

Dmitrizam commented 6 months ago

Hello!

I am interested in the security of the ODI DFP-34X-2C2 device and would like to obtain more information about the security of this device, as well as the firmware it operates on.

Questions:

  1. What security measures have been implemented in the ODI DFP-34X-2C2 device to ensure the protection of user data and network?
  2. What firmware is used on the ODI DFP-34X-2C2 device? I would like to learn about the security of this firmware and its source.
  3. Are there any known vulnerabilities or security issues that may affect the ODI DFP-34X-2C2 device? If so, what steps are being taken to address them? I would appreciate any information or recommendations regarding the security of this device.

Thank you!

Anime4000 commented 6 months ago

One bug I found is, using same login cookie can make automatically login,

for example, using login cookie on Leox Stick that allow you to login automatically on ODI stick

the bug on boa I think,

also we been trying to compile simple hello world and run on the stick and none available, this could be issue RTL9601CI and D using modified MIPS, if we manage to build own toolchain, we can improve the stick to more robust and decompile the binary blobs

I not expert on this area, if anyone have spare time, would be nice to have

qatar2030 commented 6 months ago

you say to yourself you are not expert???? come on @Anime4000 you are a genius.

Anime4000 commented 6 months ago

well, I tried to compile own binary, it just can't run,

thus reverse engineering/decompile impossible if compiler toolchain not available.

first, we need build open source toolchain for RTL9601 CPU, so we can run own code

Dmitrizam commented 6 months ago

Here, the comrades from China suggest buying a sdk from them. изображение

Dmitrizam commented 6 months ago

Hello, @Anime4000,

After analyzing the firmware of the ODI DFP-34X-2C2 device, I found that it uses Linux kernel version 2.6.30.9, which was released in 2009. Considering the age of this kernel version and possible unpatched vulnerabilities, I would like to update the system and build OpenWRT for this device to enhance its security level.

I am very interested in implementing this project and would appreciate any information that will help me in building OpenWRT for this SFP module.

Anime4000 commented 6 months ago

Yes, it use quite old kernel

second, RTL960x use heavily modified MIPS Architecture, no regular GCC compiler can compile and run

we have tried everything, still can't figure out how compile that RTL960x SoC understand.

If anyone can figure out RTL960x MIPS Architecture, it would be great, Reverse Engineer, improve, build, flash.

If this worked, can bridge automatically, if same VLAN exist on PPTP and VEIP, priority the PPTP, if none, bridge VEIP

Dmitrizam commented 6 months ago

Thank you for your prompt response and the information provided. I understand the complexity of the task, especially considering the old kernel version and the modified MIPS architecture in the RTL960x. I plan to continue my research in this direction. Thank you once again for your time and assistance.

arekm commented 6 months ago

I assume known RSDKs were tested like https://github.com/qq431169079/rsdk-1.3.6-toolchain or https://github.com/frederic/rtl819x-toolchain/tree/master/toolchain/rsdk-1.5.5-5281-EB-2.6.30-0.9.30.3-110714 (also available inside dlink gpl firmware https://dlink-gpl.s3.amazonaws.com/GPL1400349/DIR818LW_GPL200b07.tar.gz) ?

crrodriguez commented 3 months ago

Unless someone can secure access to the kernel modules of the XPON bits having a running toolchain is a wasted effort, but very much doable if one allocates time to do that. patches are posted online, base SOC stuff is as well.. but the interesting part isn't.