Skip to content
This repository holds interesting bits and pieces related to research I performed on wireless presentation devices manufactured by Awindinc and OEM'ed to multiple manufacturers.
Branch: master
Clone or download
Latest commit d549ed1 Apr 23, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
exploits Fix details. Mar 27, 2019
hardware Initial commit. Mar 26, 2019
networking Initial commit. Mar 26, 2019
README.md Update references links. Apr 23, 2019

README.md

Awind Research

This repository holds interesting bits and pieces related to research I performed on wireless presentation devices manufactured by Awindinc and OEM'ed to multiple manufacturers.

The repository is split into these subsections:

  • hardware - hardware hacking stuff, mostly for MMC dumping and pinout documentation
  • networking - PIN code bruteforcer, custom Nmap scripts and fingerprints
  • exploits - Metasploit modules and Python-based exploits.

Affected devices

The following devices were OEM'ed by Awind and are therefore affected by the same issues.

This list is non-exhaustive as it is based on devices observed on the public Internet. If you are aware of other brand/model, just shoot me an email.

Known Default Creds

Default credentials exported from installation manuals.

Manufacturer Username Password
Airmedia admin admin
Extron admin configure
Teqavit admin Admin&11
Infocus admin admin
Barco admin admin
Newline admin admin

References

You can’t perform that action at this time.