zte-config-utility icon indicating copy to clipboard operation
zte-config-utility copied to clipboard

[FEATURE] ZTE F670L FV9 Support

Open zainarbani opened this issue 3 years ago • 14 comments

Description of new feature I would like the ZTE F670L v9 router to be supported

Describe alternatives you've considered I have tried using examples/decode.py config.bin config.xml but I get the following error < AssertionError on "zcu.zte.read_header(infile)" >

Additional context Im not sure how this works but similiar utility tools check for this headers

Attach config.bin for your device I can send it if needed, also got telnet access.

zainarbani avatar Oct 29 '22 18:10 zainarbani

Using 'Felis-Sapiens' script get the following error:

python test.py config.bin conf.xml first version header magic: 0x99999999, 0x44444444, 0x55555555, 0xAAAAAAAA second version header offset: 0x14 third version header offset: 0x40000000 ERROR: failed to read the third version header Traceback (most recent call last): File "C:\Users\zain\Downloads\Compressed\test.py", line 195, in main() File "C:\Users\zain\Downloads\Compressed\test.py", line 192, in main read_config(args.infile, args.outfile, args.key) File "C:\Users\zain\Downloads\Compressed\test.py", line 101, in read_config ver_header_3 = struct.unpack('>2H5I', ver_header_3) struct.error: unpack requires a buffer of 24 bytes

zainarbani avatar Oct 30 '22 03:10 zainarbani

Another way using telnet access: https://github.com/zainarbani/ztelnet

Tested on ZTE F670L FV9

zainarbani avatar Oct 30 '22 04:10 zainarbani

Another way using telnet access: https://github.com/zainarbani/ztelnet

Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

flashworldnet avatar Nov 10 '22 02:11 flashworldnet

Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

You got telnet access?

zainarbani avatar Nov 10 '22 03:11 zainarbani

Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

You got telnet access?

I mean the tool you have mentioned above (ztelnet). It's failing 😐. So no telnet access. I asked for the procedure you followed with that tool.

flashworldnet avatar Nov 10 '22 04:11 flashworldnet

Another way using telnet access: https://github.com/zainarbani/ztelnet Tested on ZTE F670L FV9

Hi, what is the exact procedure you followed with this tool. I have a ZTE F660 v9 router, but this tool is not working for that.

You got telnet access?

I mean the tool you have mentioned above (ztelnet). It's failing 😐. So no telnet access. I asked for the procedure you followed with that tool.

Not sure, failing like what? send log

zainarbani avatar Nov 10 '22 04:11 zainarbani

bruh

output should be like this if your router supported

zainarbani avatar Nov 10 '22 04:11 zainarbani

bruh

output should be like this if your router supported

Ah then it is not supported.

flashworldnet avatar Nov 10 '22 04:11 flashworldnet

to enable telnet you can use this python project https://github.com/douniwan5788/zte_modem_tools

langit7 avatar Jul 24 '23 09:07 langit7

Just so you know and for future reference, is possible to encrypt/decrypt the config.bin for F670L router.

As commented by @zhanshi123 in #66

Your key will be the ONT serial number (ZTEGXXXXXXXX - get only last 8 hex characters in uppercase) + MAC address of your ONT (from right to left).

But rather than using the scripts from this repo —at least until payload type 6 gets supported— using the scripts from @ludufre's fork.

macydnah avatar Mar 13 '24 23:03 macydnah

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase

Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608

It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

ElclarkKuhu avatar Apr 07 '24 19:04 ElclarkKuhu

Author

version:3.1 CheckLoginAuth.gch WebRecv Fail! SendSq.gch WebRecv Fail! Enter 192.168.1.1 Telnet FactoryMode Fail!

Sadiqmac avatar Jul 08 '24 16:07 Sadiqmac

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase

Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608

It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7

Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

TechySkills avatar Jul 11 '24 14:07 TechySkills

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7

Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

zainarbani avatar Jul 12 '24 07:07 zainarbani

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

Thanks bro, It's working for me. Can you provide a tool to reencode?

JMarcosHP avatar Jul 30 '24 21:07 JMarcosHP

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

Brother what.... I dont have a config.bin... instead i got a... usbbak.cfg????

TechySkills avatar Aug 10 '24 09:08 TechySkills

um what the sigma... why close this? we need support for a usbbak.cfg format? not a config.bin

TechySkills avatar Aug 24 '24 18:08 TechySkills

to add to @macydnah and @zhanshi123 The key is Last 6 hex characters in uppercase + MAC Address From Right To Left in lowercase Example: Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Mac Address: 08:F6:06:D4:38:F4 => f438d406f608 Key: CF4EF6F7f438d406f608 It take me hours to notice that the the mac address supposed to be lowercase, just in case people have the same problem with me

Serial No: XXXXXX-ZTEGCF28772B => CF4EF6F7 Bro how did you convert CF28772B => CF4EF6F7 I just cant understand that....

Try this: https://gist.github.com/zainarbani/723d1387bec9e1559de7a1029d08aa91

python decrypt.py config.bin config.xml --sn ZTEXXXXXXXX --mac xx:xx:xx:xx:xx:xx

Just put your actual MAC/SN, This is the same code, just standalone decryptor.

not working

Detected signature: F670L Detected payload type 6 MAC: xxxxxxxxxxxxxxxxxx (yes, I put mac address) S/N: xxxxxxxxxxxxxxxxxx (yes,I put serial number) Traceback (most recent call last): File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 218, in main() File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 204, in main res, _ = zteCompression.decompress(infile) File "C:\Users\cyber\OneDrive\Escritorio\zte-config-utility-master\examples\decrypt.py", line 140, in decompress aes_header = struct.unpack('>3I', infile.read(12)) struct.error: unpack requires a buffer of 12 bytes

cybercuate avatar Aug 31 '24 19:08 cybercuate

Totally noob question but Where I can find the config.xml file?

Mesier83 avatar Sep 11 '24 23:09 Mesier83

You can export the settings of your router by going in Management and Diagnostics, and then System Management and then you can export afaik Regards TechySkills

On Thu, Sep 12, 2024 at 4:35 AM Mesier83 @.***> wrote:

Totally noob question but Where I can find the config.xml file?

— Reply to this email directly, view it on GitHub https://github.com/mkst/zte-config-utility/issues/52#issuecomment-2344972132, or unsubscribe https://github.com/notifications/unsubscribe-auth/ATS23JY4733SFIAU6WFRYMDZWDHVPAVCNFSM6AAAAAARR5B4WCVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGNBUHE3TEMJTGI . You are receiving this because you commented.Message ID: @.***>

TechySkills avatar Sep 13 '24 10:09 TechySkills

Some ISP disabled export config image

langit7 avatar Sep 13 '24 11:09 langit7