New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Router cant uncompress files #31
Comments
I think that message is received every time, the exploit works anyway |
But after executing command, the message is "502 Bad Gateway" (Im using v0.0.1) and the web page wont work for a while, netcat wont receive anything either. Before I open this issue I have flash mir4a to factory setting with official firmware. |
I found the reason, it is because that in the speedtest, some url can be accessed in my area, but if I replace some of these, then the message will become "Error speedtesting" but not Script executed. |
Make sure your network configuration is as simple as possible, that you are configuring the right IPs and that connection between your computer and the router is happening |
Not sure where to put this comment, but it should help whoever has the same problem as me: On my 4A, versions 0.0.2 and 0.0.3 of the exploit did not work. the commands did get executed on the router but the telnet daemon did not run. From there, I manually executed the exploit command and got the output "curl (51) error" So if you run into the same problem as me, append By doing this you also don't have to reset your router nor anything. it seems that this is the cause of most of the issues previously related here. so I hope this helps so we can get more people onboard custom firmwares for this router. |
@hstr0100 nice! Ill include |
…he user runs the script in a complex network setup. See: #31 (comment)
Also released new version 0.0.4 😄 https://github.com/acecilia/OpenWRTInvasion/releases/tag/0.0.4 |
When it uploaded config files (payload.tar.gz), it said "code":"1629:, msg is Error uncompressingm, the fies may damaged.
The text was updated successfully, but these errors were encountered: