Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for Technicolor DGA4330 (VBNT-7) from Telia Lithuania in Lithuania #342

Open
1 of 3 tasks
EimisM opened this issue Oct 28, 2024 · 4 comments
Open
1 of 3 tasks

Comments

@EimisM
Copy link

EimisM commented Oct 28, 2024

General info

My gateway is currently running firmware version 18.3.0842-2981015-20231222101034 from Telia Lithuania in Lithuania

  • Product: Technicolor DGA4330
  • ISP: Telia Lithuania
  • Countries: Lithuania, Estonia,
  • Commercial name from the ISP: Telia x2
  • Board: VBNT-7

Did anybody ever manage to get root on that device already?

Select all applicable

  • Yes, by using a root strategy listed in the wiki
  • Yes, following another different strategy
  • No, as far as I know it has never been rooted

Say something more about the adopted strategy here

Firmware versions

This is the only firmware version I know about, I just want to root this router so I could actually change my DNS settings and remove some of the ads on my network. I've not yet tried to root this router because I was unable to find any kind of firmware files on the internet and I don't want to brick this router with the wrong files.

Would be glad to contribute by giving you any logs or anything else you might need to help with this, just need a little bit of guidance.

@EimisM EimisM changed the title Support for Technicolor Telia X2 (VBNT-70 from Telia Lithuania in Lithuania Support for Technicolor Telia X2 (VBNT-70) from Telia Lithuania in Lithuania Oct 28, 2024
@LuKePicci
Copy link
Collaborator

Thank you, I'd suggest you try grabbing the RBI files for your current firmware at first since you are on Telia connection. About root strategies, I think you can try with other working strategies that have been tested for other Telia devices of the same major firmware release just take your time in looking how to run tch-exploit from a local interface in the mgmt tagged vlan.

@EimisM
Copy link
Author

EimisM commented Oct 28, 2024

@LuKePicci I've tried all the methods listed except replacing RBI files. None of them seemed to work. tch-exploit simply been stuck on the initial cmd output for 15 minutes without nothing happening.

A# AutoFlashGUI - didn't seem to do anything, just said to try to login via ssh without no avail. Also, tried different methods like ping, Basic DDNS and Advanced DDNS without any luck.
#B FASTGate samba hack - could not perform as I don't have SSH access
#C tch-exploit - been stuck on the initial cmd output whenever I'd run the script with admin rights. And if it does it gives this output and then never continues added in a spoiler below. I've also tried to disable my firewall while performing this.

tch-exploit output
PS C:\Users\Eimis\Desktop\release> .\tch-exploit-win.exe
Technicolor OpenWRT Shell Unlocker v2.0.1-rc7 By BoLaMN

* Connect network cable from your computer to the WAN (red) port of the modem
* Change your computers network card to be a static ip address

  IPv4 Address: 58.162.0.1
  Subnet Mask: 255.255.255.0
  Default Gateway\Router: 58.162.0.1

using interface { name: 'Ethernet', address: '58.162.0.1', family: 'IPv4' }
listening for cwmp requests at http://58.162.0.1:57555/
Waiting for DHCP request... 0.0.0.0:67
Waiting for DHCPv6 request... :::547
Option 124 not known
### MESSAGE {"op":1,"htype":1,"hlen":6,"hops":0,"xid":1759898770,"secs":311,"flags":0,"ciaddr":"0.0.0.0","yiaddr":"0.0.0.0","siaddr":"0.0.0.0","giaddr":"0.0.0.0","chaddr":"A0-B5-3C-C8-E7-24","sname":"","file":"","magicCookie":1669485411,"options":{"12":"Telia X2-CP2241SAV6F-18.3.0842-2981015","53":1,"55":[1,3,6,15,33,42,43,51,121,125,249,212],"57":1500,"60":"LongLeaseTime","145":[1]}}
>>> DISCOVER {"address":"58.162.0.12","leasePeriod":86400,"server":"58.162.0.1","state":"OFFERED"}
<<< OFFER {"op":2,"htype":1,"hlen":6,"hops":0,"xid":1759898770,"secs":0,"flags":0,"ciaddr":"0.0.0.0","yiaddr":"58.162.0.12","siaddr":"58.162.0.1","giaddr":"0.0.0.0","chaddr":"A0-B5-3C-C8-E7-24","sname":"","file":"","options":{"1":"255.255.255.0","3":["58.162.0.1"],"6":["8.8.8.8","8.8.4.4"],"12":"second.gateway","43":[1,24,104,116,116,112,58,47,47,53,56,46,49,54,50,46,48,46,49,58,53,55,53,53,53,47,2,7,84,101,108,115,116,114,97],"51":86400,"53":2,"54":"58.162.0.1"}}
Option 124 not known
### MESSAGE {"op":1,"htype":1,"hlen":6,"hops":0,"xid":1759898770,"secs":311,"flags":0,"ciaddr":"0.0.0.0","yiaddr":"0.0.0.0","siaddr":"0.0.0.0","giaddr":"0.0.0.0","chaddr":"A0-B5-3C-C8-E7-24","sname":"","file":"","magicCookie":1669485411,"options":{"12":"Telia X2-CP2241SAV6F-18.3.0842-2981015","50":"58.162.0.12","53":3,"54":"58.162.0.1","55":[1,3,6,15,33,42,43,51,121,125,249,212],"57":1500,"60":"LongLeaseTime","145":[1]}}
>>> REQUEST {"address":"58.162.0.12","leasePeriod":86400,"server":"58.162.0.1","state":"BOUND","bindTime":"2024-10-28T21:58:13.688Z","file":""}
### BOUND {"A0-B5-3C-C8-E7-24":{"address":"58.162.0.12","leasePeriod":86400,"server":"58.162.0.1","state":"BOUND","bindTime":"2024-10-28T21:58:13.688Z","file":""}}
### MESSAGE {"op":1,"htype":1,"hlen":6,"hops":0,"xid":3900742340,"secs":312,"flags":0,"ciaddr":"0.0.0.0","yiaddr":"0.0.0.0","siaddr":"0.0.0.0","giaddr":"0.0.0.0","chaddr":"A2-B5-3C-C8-E7-25","sname":"","file":"","magicCookie":1669485411,"options":{"12":"OpenWrt","53":1,"55":[1,3,6,15,33,42,43,51,121,249],"57":1500,"60":"IPTV_RGW_PRIV","145":[1]}}
>>> DISCOVER {"address":"58.162.0.14","leasePeriod":86400,"server":"58.162.0.1","state":"OFFERED"}
<<< OFFER {"op":2,"htype":1,"hlen":6,"hops":0,"xid":3900742340,"secs":0,"flags":0,"ciaddr":"0.0.0.0","yiaddr":"58.162.0.14","siaddr":"58.162.0.1","giaddr":"0.0.0.0","chaddr":"A2-B5-3C-C8-E7-25","sname":"","file":"","options":{"1":"255.255.255.0","3":["58.162.0.1"],"6":["8.8.8.8","8.8.4.4"],"12":"second.gateway","43":[1,24,104,116,116,112,58,47,47,53,56,46,49,54,50,46,48,46,49,58,53,55,53,53,53,47,2,7,84,101,108,115,116,114,97],"51":86400,"53":2,"54":"58.162.0.1"}}

#D clash escaping - could not perform as I don't have SSH access
#E Stock samba hack - patched

Could you elaborate on how could I grab the RBI files of the current firmware? Thanks

Also, if I try to use AutoFlashGUI to flash my router's firmware with version - 19.4.0539-4521016 while my router's current one is 18.3.0842-2981015-20231222101034 wouldn't that cause major issues or brick the device? 19.4.0539-4521016 Firmware is meant for DGA0122 / VCNT-P, however I've had that router before and at least from what the end user can see in the router admin page is exactly the same options as with the current one.

@EimisM EimisM changed the title Support for Technicolor Telia X2 (VBNT-70) from Telia Lithuania in Lithuania Support for Technicolor Telia X2 (VBNT-7) from Telia Lithuania in Lithuania Oct 28, 2024
@EimisM EimisM changed the title Support for Technicolor Telia X2 (VBNT-7) from Telia Lithuania in Lithuania Support for Technicolor DGA4330 (VBNT-7) from Telia Lithuania in Lithuania Oct 29, 2024
@VytautasKz
Copy link

@EimisM

Just a guess, but when I tried TCH exploit with my Telia F1 router, it also got stuck around the same step. What I observed is the router trying to send DNS requests, requesting acs.telia.lt. Yours is probably doing the same thing.

@EimisM
Copy link
Author

EimisM commented Nov 21, 2024

@VytautasKz Did you manage to get through this issue? If so could you help me out with it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants