Skip to content
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
69 lines (53 sloc) 3.74 KB

Awind Research

This repository holds interesting bits and pieces related to research I performed on wireless presentation devices manufactured by Awindinc and OEM'ed to multiple manufacturers.

The repository is split into these subsections:

  • hardware - hardware hacking stuff, mostly for MMC dumping and pinout documentation
  • networking - PIN code bruteforcer, custom Nmap scripts and fingerprints
  • exploits - Metasploit modules and Python-based exploits.

Affected devices

The following devices were OEM'ed by Awind and are therefore affected by the same issues.

This list is non-exhaustive as it is based on devices observed on the public Internet. If you are aware of other brand/model, just shoot me an email.

Known Default Creds

Default credentials exported from installation manuals.

Manufacturer Username Password
Airmedia admin admin
Extron admin configure
Teqavit admin Admin&11
Infocus admin admin
Barco admin admin
Newline admin admin


You can’t perform that action at this time.