Created
November 18, 2021 08:46
-
-
Save JorWang/4c7805168c7d34f4c9f578dc60033339 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
连接解锁路由 | |
http://192.168.31.1/cgi-bin/luci/;stok=<STOK>/api/misystem/extendwifi_connect?ssid=MEDIATEK-ARM-IS-GREAT&password=ARE-YOU-OK | |
http://192.168.31.1/cgi-bin/luci/;stok=<STOK>/api/xqsystem/oneclick_get_remote_token?username=xxx&password=xxx&nonce=xxx | |
scp ax3000.sh [email protected]:/etc/ax3000.sh | |
scp fuckax3000 [email protected]:/etc/fuckax3000 | |
备份原厂固件 | |
sh /etc/ax3000.sh dump | |
http://192.168.31.1/backup/log/bdata_mtd9.img | |
固化SSH | |
sh /etc/ax3000.sh unlock | |
路由器会自行重启,重启后执行 | |
sh /etc/ax3000.sh hack | |
挂载 overlay 空间 | |
sh /etc/ax3000.sh mount | |
自行重启路由器,然后执行 | |
sh /etc/ax3000.sh keep | |
https://xn--m80a.ml/openwrt/dev/10.html | |
https://github.com/shell-script/unlock-redmi-ax3000 | |
https://github.com/paldier/ax3600_tool | |
https://www.oxygen7.cn/miwifi/ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment