mkst / zte-config-utility

Scripts for decoding/encoding config.bin for ZTE routers
MIT License
235 stars 77 forks source link

[FEATURE] ZTE F670L FV9 Support #52

Closed zainarbani closed 1 month ago

zainarbani commented 1 year ago

Description of new feature I would like the ZTE F670L v9 router to be supported

Describe alternatives you've considered I have tried using examples/decode.py config.bin config.xml but I get the following error < AssertionError on "zcu.zte.read_header(infile)" >

Additional context Im not sure how this works but similiar utility tools check for this headers

Attach config.bin for your device I can send it if needed, also got telnet access.

zainarbani commented 1 year ago

Using 'Felis-Sapiens' script get the following error:

python test.py config.bin conf.xml first version header magic: 0x99999999, 0x44444444, 0x55555555, 0xAAAAAAAA second version header offset: 0x14 third version header offset: 0x40000000 ERROR: failed to read the third version header Traceback (most recent call last): File "C:\Users\zain\Downloads\Compressed\test.py", line 195, in main() File "C:\Users\zain\Downloads\Compressed\test.py", line 192, in main read_config(args.infile, args.outfile, args.key) File "C:\Users\zain\Downloads\Compressed\test.py", line 101, in read_config ver_header_3 = struct.unpack('>2H5I', ver_header_3) struct.error: unpack requires a buffer of 24 bytes

zainarbani commented 1 year ago

Another way using telnet access: https://github.com/zainarbani/ztelnet

Tested on ZTE F670L FV9

flashworldnet commented 1 year ago

Another way using telnet access: https://github.com/zainarbani/ztelnet

Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

zainarbani commented 1 year ago

Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

You got telnet access?

flashworldnet commented 1 year ago

Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

You got telnet access?

I mean the tool you have mentioned above (ztelnet). It's failing 😐. So no telnet access. I asked for the procedure you followed with that tool.

zainarbani commented 1 year ago

Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

You got telnet access?

I mean the tool you have mentioned above (ztelnet). It's failing 😐. So no telnet access. I asked for the procedure you followed with that tool.

Not sure, failing like what? send log

zainarbani commented 1 year ago

bruh

output should be like this if your router supported

flashworldnet commented 1 year ago

bruh

output should be like this if your router supported

Ah then it is not supported.

langit7 commented 1 year ago

to enable telnet you can use this python project https://github.com/douniwan5788/zte_modem_tools

macydnah commented 7 months ago

Just so you know and for future reference, is possible to encrypt/decrypt the config.bin for F670L router.

As commented by @zhanshi123 in #66

Your key will be the ONT serial number (ZTEGXXXXXXXX - get only last 8 hex characters in uppercase) + MAC address of your ONT (from right to left).

But rather than using the scripts from this repo —at least until payload type 6 gets supported— using the scripts from @ludufre\'s fork.

ElclarkKuhu commented 6 months ago

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase

Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608

It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Sadiqmac commented 3 months ago

Author

version:3.1 CheckLoginAuth.gch WebRecv Fail! SendSq.gch WebRecv Fail! Enter 192.168.1.1 Telnet FactoryMode Fail!

TechySkills commented 3 months ago

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase

Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608

It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7

Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

zainarbani commented 3 months ago

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7

Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

JMarcosHP commented 2 months ago

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

Thanks bro, It's working for me. Can you provide a tool to reencode?

TechySkills commented 2 months ago

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

Brother what.... I dont have a config.bin... instead i got a... usbbak.cfg????

TechySkills commented 1 month ago

um what the sigma... why close this? we need support for a usbbak.cfg format? not a config.bin

cybercuate commented 1 month ago

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

not working

Detected signature: F670L Detected payload type 6 MAC: xxxxxxxxxxxxxxxxxx (yes, I put mac address) S/N: xxxxxxxxxxxxxxxxxx (yes,I put serial number) Traceback (most recent call last): File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 218, in main() File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 204, in main res, _ = zteCompression.decompress(infile) File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 140, in decompress aes_header = struct.unpack('>3I', infile.read(12)) struct.error: unpack requires a buffer of 12 bytes

Mesier83 commented 1 month ago

Totally noob question but Where I can find the config.xml file?

TechySkills commented 1 month ago

You can export the settings of your router by going in Management and Diagnostics, and then System Management and then you can export afaik Regards TechySkills

On Thu, Sep 12, 2024 at 4:35 AM Mesier83 @.***> wrote:

Totally noob question but Where I can find the config.xml file?

— Reply to this email directly, view it on GitHub https://github.com/mkst/zte-config-utility/issues/52#issuecomment-2344972132, or unsubscribe https://github.com/notifications/unsubscribe-auth/ATS23JY4733SFIAU6WFRYMDZWDHVPAVCNFSM6AAAAAARR5B4WCVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGNBUHE3TEMJTGI . You are receiving this because you commented.Message ID: @.***>

langit7 commented 1 month ago

Some ISP disabled export config image