You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note: I had to connect the router to the internet through the WAN port for the exploit to succeed. Neither option 1 nor 2 worked while the router had no internet. I was connected to the router via Wi-Fi while performing the exploit.
Can also confirm that 3.0.35 worked for version 0.0.1; this was achieved over WLAN, with no WAN connection at all. I was connected with the 4A Gigabit (Global) wired via ethernet to a mikrotik which serves as a managed switch and gateway to the lab network.
Reporting exploit success on 3.0.35 firmware.
Followed the guide: https://openwrt.org/inbox/toh/xiaomi/xiaomi_mi_router_4a_gigabit_edition
Note: I had to connect the router to the internet through the WAN port for the exploit to succeed. Neither option 1 nor 2 worked while the router had no internet. I was connected to the router via Wi-Fi while performing the exploit.
xiaomi_dmesg.txt
bootloader_dump.zip
exploit.txt
xiaomi_bootloader_dump.txt
The text was updated successfully, but these errors were encountered: