🪛 Telstra Smart Modem Gen3
A teardown guide and some technical analysis of the dna0332tls product, manufactured by Technicolor.
Note:
The following is for educational purposes only.
Teardown guide:
Tools:
- Plastic pry tool
- Screwdriver with a CR-VT10 Bit (security)
- 8mm socket /w ratchet or a 8mm wrench
Steps:
- Disconnect the backup SIM card if inserted and remove the top-plate; there are four retainers in each corner facing inwards and pry gently but with mindful force
- Remove rubber feet on bottom of device
- Unscrew the covers and nuts located on the threading of PRI and DIV, remove washers also
- Remove the screws that are now exposed from removing the feet (note: they are torx security, a smooth ended bit won’t work)
- Lift off the base plate - There are no retainers, this will come straight off
- From the bottom, pry the outer-plastic plate in an outwards direction to release it from the rear-plate
- Once this is freed the entire inner-structure will easily slide out (pull the outer shell in an upwards direction)
- To remove the back-plate gently pry from the right-hand side (the LED section) of the unit - there are 3 plastic tabs top, middle and bottom located in the centre of that plate
- From here you have general access to 90% of the PCBs - You can easily access JM102
Key Info & Related Sources:
Key-points:
- This model (VCNT-8) has a different boot-loader (U-Boot) comparatively to the VCNT-A model (Gen2).
- I obtained root access by following the
Type 2
method and#C (tch-exploit)
as done previously on Gen2: Hack Technicolor - I had successfully completed this on version20.4.0256-MR0-RA
. This method is untested against20.4.0319-MR0-RA
. - The type of firmware that runs on this machine is also a fork of OpenWRT: Source
- Due to the boot-loader difference, this device does not use the
*.rbi
filetype for it’s firmware via CWMPD (TFTP) rather a*.pkgt
. - Here is the captured cwmpd request from a live GET request:
http://fwstore.bdms.telstra.net/Technicolor_vcnt-8_20.4-319-RC4.2-RA-bootstrap/bcmVCNT-8_nand256_ubifs_update-r20.4-319-2-1-MR0-RA-BOOTSTRAP-signed.pkgtb
- Primary cwmpd request server (model-specific):
https://cobraxh.technicolor.cwmp.bdms.telstra.net/cwmp/cwmp#/
- The JM102 header for serial access does work and provides insight into BOOT-P.
Here are some related sources:
Todo:
Untested/In progress work:
- Identify the Day0 CWMPD URI
Last modified November 11, 2023: Adds emojis + Removes projects + Adds guide (4c2e5f4)