Table of Contents
Networking Hardware
Devices meant for managing and controlling a network. This does not include modems or routers; see Routers and Modems for this. These devices, unlike the aforementioned routers, will run a large variety of architectures. SuperH, ARM, x86, and MIPS are just some of the potential CPUs, while OSes will vary from Linux variants, BSD variants, DOS variants, and more.
Armish-based devices
Operating Systems (ARM)
OpenBSD
It is intended to support a variety of rather similar ARM-based machines
This port was discontinued in 2016 with 5.9/6.0, but it is capable of putting OpenBSD on various network-based hardware on the “ARMish” architecture, which may or may not be an official name.
Connected Data Transporter
Operating Systems
Linux
gain persistent root access after hooking up your UART adapter and hijacking kernel init
This little remote file access thing has a method for persistent root access, via exploiting the open U-Boot over UART.
https://www.exploitee.rs/index.php/Connected_Data_Transporter
CruiseLAN Access Points
Operating Systems (AMD 386SX-40)
DR-DOS
I plugged it back in and it boots! It's running DR-DOS
Very low power, due to the lack of RAM. Can barely run crummy edutainment games, Despite all of this, it is in fact a little DOS 386 computer. May be possible to do RAM upgrades, and thus, get a more serviceable PC out of it.
Emulation Nest
This device runs an operating system which is known to emulate various devices with EOPs. See the DOS page.
Fluke EtherScope Analyzer
Operating Systems (Marvell ARM LUPXA255A0 C400/PXA255)
Linux?
Even the guy in the video isn’t entirely sure, but this appears to run Linux, considering there’s references to it all over the place. Whether it can be hacked and unlocked, however, is a different question entirely… also, it has a web browser
Google OnHub
Operating Systems
Root access
Remove the hidden screw under your OnHub to access the hidden “Developer Mode” switch
By enabling a developer mode and running various commands, it’s possible to open root ssh access onto these things. Asus has made one too, and those links are included in this entry.
I-ODATA NAS series
Operating Systems (Super-H 4)
NetBSD
UHDL-160U and UHDL-300U (May be found in USA)
A fair amount of NAS appliances are supported by this NetBSD port. While they are primarily found in Japan, a few models may be available in the United States. A few Plextor devices are also compatible with this port.
OpenBSD
OpenBSD/landisk is the 1st OpenBSD port to a Hitachi/Renesas SH-4 based machine
Similar to the NetBSD port, this version of OpenBSD supports a variety of these SH-4 based devices.
Lexmark N2050 Wi-Fi Card/Server
Operating Systems (???)
Linux + Busybox
You now are root user in the N2050.
This is a Wi-Fi Card found only in the Lexmark X6570, a relatively old printer. With some soldering, USB-UART, and some wires, it can be hacked and turned into a basic root-access linux computer. Many print servers may be like this, so keep that in mind.
https://en.wikipedia.org/wiki/Print_server
https://web.archive.org/web/20120616095609/http://wiki.freegeekarkansas.org/fgar/
Netgear WN3000RP
Operating Systems (MIPS?)
OpenWRT
a telnet daemon can be launched by executing '/usr/sbin/telnetd &'
Simple UART access and starting telnet allows remote root access to this device’s preexisting OpenWRT installation.
QNAP TS-131
Operating Systems
Linux
This service is vulnerable to a command injection vulnerability resulting in remote cmd execution
A QNAP TS-131 was the device used for this exploit, but it will work on many QNAP devices of this kind. In essence, it hijacks a certain service that transcodes files, with the purpose of attaining root cmd access.
Smoothwall ??? Switch
Operating Systems (something x86-64)
Various OSes (+Doom)
install HDD, spam F2 on boot, install any OS you like (Mac, Windows, Linux, BSD, etc)
All this needs is a display and keyboard hooked up to it. For some reason, despite just being a network switch, the hardware in there is powerful enough to run those listed OSes, plus Doom as a demonstration, of course.
Sonus SBC 1000 Gateway
Operating Systems (x86?)
Emulation Nest
This device runs an operating system which is known to emulate various devices with EOPs. See the DOS page.
WinNT, XP, Win10, DOS, etc.
The function of this is hard to classify, but in essence, it is a low-power device meant for accessing a host machine using VoIP sessions. Even though it’s normally meant to be used headless, there is a VGA output available on it’s front. Using this and a USB drive, one can install various OSes on this, while playing games such as DOOM and MS Flight Simulator.
https://www.youtube.com/watch?v=pCPseZTZtaI
https://www.youtube.com/watch?v=XyX5VURNXps
https://www.ucmadscientist.com/running-doom-on-a-teams-isdn-gateway/
https://www.ucmadscientist.com/ribbon-sbc-1000s-dirty-little-secret-vga-port/
Western Digital MyCloud
Operating Systems (???)
Linux
a series of network attached storage devices
An absolutely massive amount of exploits and methods exist for this thing. One can even write to it’s LCD. Pick the method that is best suited for one’s purposes.