Closed zainarbani closed 1 month ago
Using 'Felis-Sapiens' script get the following error:
python test.py config.bin conf.xml first version header magic: 0x99999999, 0x44444444, 0x55555555, 0xAAAAAAAA second version header offset: 0x14 third version header offset: 0x40000000 ERROR: failed to read the third version header Traceback (most recent call last): File "C:\Users\zain\Downloads\Compressed\test.py", line 195, in
main() File "C:\Users\zain\Downloads\Compressed\test.py", line 192, in main read_config(args.infile, args.outfile, args.key) File "C:\Users\zain\Downloads\Compressed\test.py", line 101, in read_config ver_header_3 = struct.unpack('>2H5I', ver_header_3) struct.error: unpack requires a buffer of 24 bytes
Another way using telnet access: https://github.com/zainarbani/ztelnet
Tested on ZTE F670L FV9
Another way using telnet access: https://github.com/zainarbani/ztelnet
Tested on ZTE F670L FV9
Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.
Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9
Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.
You got telnet access?
Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9
Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.
You got telnet access?
I mean the tool you have mentioned above (ztelnet). It's failing 😐. So no telnet access. I asked for the procedure you followed with that tool.
Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9
Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.
You got telnet access?
I mean the tool you have mentioned above (ztelnet). It's failing 😐. So no telnet access. I asked for the procedure you followed with that tool.
Not sure, failing like what? send log
output should be like this if your router supported
output should be like this if your router supported
Ah then it is not supported.
to enable telnet you can use this python project https://github.com/douniwan5788/zte_modem_tools
Just so you know and for future reference, is possible to encrypt/decrypt the config.bin for F670L router.
As commented by @zhanshi123 in #66
Your key will be the ONT serial number (ZTEGXXXXXXXX - get only last 8 hex characters in uppercase) + MAC address of your ONT (from right to left).
But rather than using the scripts from this repo —at least until payload type 6 gets supported— using the scripts from @ludufre\'s fork.
to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase
Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608
It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me
Author
version:3.1 CheckLoginAuth.gch WebRecv Fail! SendSq.gch WebRecv Fail! Enter 192.168.1.1 Telnet FactoryMode Fail!
to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase
Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608
It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me
Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7
Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....
to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me
Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7
Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....
Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91
python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx
Just put your actual MAC/SN, This is the same code, just standalone decryptor.
to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me
Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....
Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91
python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx
Just put your actual MAC/SN, This is the same code, just standalone decryptor.
Thanks bro, It's working for me. Can you provide a tool to reencode?
to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me
Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....
Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91
python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx
Just put your actual MAC/SN, This is the same code, just standalone decryptor.
Brother what.... I dont have a config.bin... instead i got a... usbbak.cfg????
um what the sigma... why close this? we need support for a usbbak.cfg format? not a config.bin
to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me
Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....
Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91
python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx
Just put your actual MAC/SN, This is the same code, just standalone decryptor.
not working
Detected signature: F670L
Detected payload type 6
MAC: xxxxxxxxxxxxxxxxxx (yes, I put mac address)
S/N: xxxxxxxxxxxxxxxxxx (yes,I put serial number)
Traceback (most recent call last):
File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 218, in
Totally noob question but Where I can find the config.xml file?
You can export the settings of your router by going in Management and Diagnostics, and then System Management and then you can export afaik Regards TechySkills
On Thu, Sep 12, 2024 at 4:35 AM Mesier83 @.***> wrote:
Totally noob question but Where I can find the config.xml file?
— Reply to this email directly, view it on GitHub https://github.com/mkst/zte-config-utility/issues/52#issuecomment-2344972132, or unsubscribe https://github.com/notifications/unsubscribe-auth/ATS23JY4733SFIAU6WFRYMDZWDHVPAVCNFSM6AAAAAARR5B4WCVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGNBUHE3TEMJTGI . You are receiving this because you commented.Message ID: @.***>
Some ISP disabled export config
Description of new feature I would like the ZTE F670L v9 router to be supported
Describe alternatives you've considered I have tried using examples/decode.py config.bin config.xml but I get the following error < AssertionError on "zcu.zte.read_header(infile)" >
Additional context Im not sure how this works but similiar utility tools check for this headers
Attach config.bin for your device I can send it if needed, also got telnet access.