Went through some files and updated the repo with what I hope is the correct firmware versions. All versions should be covered by the various tools and such.
The major changes to the firmware where to support new Realtek ASIC but they also attempted to prevent the 1cent upgrade from unmanaged...
That looks correct from a quick observation.
I have verified using fresh and obsolete GD25Q32B which doesn't support the unique ID command but does in an undocumented manner returning c800c800c800c800 derived from the manufacturer id. Still best to use a Fudan flash as the manufacturer of these...
I helped solve how the security bytes are generated.
https://github.com/up-n-atom/SWTG118AS/issues/4
or reiterated at
https://github.com/libc0607/Yakigani/issues/1
You can dump the unique id of your flash and run the python script posted in either of those github issues to generate the otp...
The offsets would need to be changed in the code if used on a flash dump based on GitHub - up-n-atom/SWTG118AS: SWTG###AS RE I could possibly add it in the future.
I do see the jump you've modified at 0xdd406 in a flash dump is part of the payload and also included in the updates hence the...
Just a cheap aluminum sink. Unless you have a band saw or want to grunt it with a hack saw I'd recommend to buy as close to the length as possible instead.
https://aliexpress.com/item/1005003083684958.html
The pad is cut from a sample from Bergquest GPVOUS-0.250-01-0816 which isn't realistic...
Did the same and used 7mm high which has about 1-2mm of headroom. 55mm length and cut to length, depending on the pad thickness it can be anywhere from 35-40mm.
Usually a fast blinking LED indicates it's in download mode at http://192.168.1.1 (not https, some browsers will force https so disable that feature)
1. SWTG118AS/photos/SWTG118AS-v1.0/SWTG118AS-v1-pcb-front.jpg at main · up-n-atom/SWTG118AS And make sure the jumper is set for 3.3V and you...
It shouldn't of touched the bootloader/backup partitions so if you have USB to 3.3V TTY serial adapter you can just hold ESC and power on the switch and it'll go into upload mode at http://192.168.1.1 where you can use the proper firmware update.
==========Loader start===========
Press any key...
if you got an idea of the network nmap can make a quick job of it. If not it's just easier to listen in for the arp requests with tshark/wireshark eg. I isolated to a single specific interface connected to the switch and filter for arp.
sudo tshark -i enp0s20f0u3 -f "arp"
Running as user "root"...
It's irrelevant, you can change the hash in the update firmware and run the Python Script to update the checksums and find it's not used. Although I haven't tested after I wiped out the config and when those hard coded credentials come into use. Anyway the cgi's can be directly called so again...
Added photos incl. mods for testing firmware and the SWTG115AS v2.0 flash dump to my repo but I'll add that here as well.
Again, if anyone is willing to dump the SWTG118AS v2.0 via the serial console that'll be much appreciated. You can use either Real Term or Tera Term on Windows and this...
It's all in my repo GitHub - up-n-atom/SWTG118AS: SWTG118AS and SWTG115AS RE and don't connect VCC. I actually need someone to dump their SWTG118AS v2.0 flash, ie. web managed.
hold v and plug in power and type r 0 65473 which overflows and seems to dump forever but you just need to stop it at...
I didn't get the hengrui password and login_ft.cgi to work. You can access the the factory methods using the admin credentials by cgi (attached is an example of changing the colour to pink)
/ftdft.cgi
/ftlogo.cgi
/ftcolor.cgi
Here's a Python script that will validate and/or update the header...
There definitely is a boot/base image partition as well as a config partition. I've wired up the serial and dumped the unmanaged version and tomorrow I have a web managed version coming in to dump.
Regardless of vendor the PCB has the same marking SWTG118AS with the unmanged version being V1.0...
Not sure if anyone looked at the firmware but there is a hidden factory? account
user: hengrui
password md5: 81d57ea79621e8887914f40ee4122185
I asked Horaco what the password was but they weren't forthcoming or acknowledged the existence of the account. Maybe they don't know if they're just a...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.