Resetting.....

Upcoming fresh hacks

Non-Technical Hacks that works - Have Fun! (Status: in progress..)

Hacking network based biometric time-attendance system - Be your own boss! (Status: Done!)
Milestone Xprotect License Bypass hack - Replace a camera without license re-activation (Status: Done!)

Saturday, June 11, 2011

Zain Wimax: Huawei Echolife BM635 Certificates dump

Zain Broadband 2.0 (Wimax) Huawei Echolife BM635 Certificates dump

ZAINRootcaCert.pem
ZAINCpeCert.pem
ZAINCpeKey.pem

Decrypted:

Root Certificate:
-----------------------START------------------------
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
9c:92:5d:7a:72:19:b6:0b
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=BH, ST=MANAMA, L=Bahrain, O=ZAIN Bahrain Telecom Company, OU=Z
AIN, CN=ZAIN Bahrain Telecom Company Root CA/emailAddress=samir.reyad@bh.zain.com
Validity
Not Before: Jul 23 06:41:56 2010 GMT
Not After : May 18 06:41:56 2035 GMT
Subject: C=BH, ST=MANAMA, L=Bahrain, O=ZAIN Bahrain Telecom Company, OU=
ZAIN, CN=ZAIN Bahrain Telecom Company Root CA/emailAddress=samir.reyad@bh.zain.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:ca:21:38:22:ef:cf:a2:63:75:a0:cb:70:d1:3f:
75:d6:bf:d6:93:aa:73:2d:0f:81:9f:ef:27:fd:e8:
dd:96:3a:92:b5:2b:32:90:81:ad:e9:ae:df:57:ca:
f6:8c:a2:10:ff:19:29:ce:7b:32:54:4b:e8:9c:42:
64:90:8b:78:2d:b3:3b:8c:64:4b:11:38:a6:b7:90:
4f:49:72:80:5f:06:e1:68:19:28:ae:81:ef:bc:57:
7e:09:57:a6:d7:a6:0f:4b:f0:21:21:90:20:d9:76:
2f:be:c0:20:0a:4f:57:63:cd:c7:95:29:e2:b8:56:
62:ee:f5:f4:ad:fd:4f:de:f9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
25:2D:F4:8A:03:FE:3A:1A:C3:48:A6:03:D1:A1:37:E9:93:DB:B0:28
X509v3 Authority Key Identifier:
keyid:25:2D:F4:8A:03:FE:3A:1A:C3:48:A6:03:D1:A1:37:E9:93:DB:B0:28
DirName:/C=BH/ST=MANAMA/L=Bahrain/O=ZAIN Bahrain Telecom Company
/OU=ZAIN/CN=ZAIN Bahrain Telecom Company Root CA/emailAddress=samir.reyad@bh.zain.com
serial:9C:92:5D:7A:72:19:B6:0B

X509v3 Basic Constraints:
CA:TRUE
X509v3 Key Usage:
Certificate Sign, CRL Sign
Signature Algorithm: sha1WithRSAEncryption
1f:4a:51:08:37:73:a9:d3:df:0a:7e:0b:1b:d1:2d:50:b6:3f:
a9:7f:bb:23:f6:ce:59:06:f0:d7:c4:6e:be:2f:72:a6:44:08:
72:ea:8c:67:ad:48:96:62:ba:b2:59:87:0f:ea:f1:cb:50:3e:
59:34:b3:b0:cc:37:40:97:14:cd:cb:eb:8c:97:51:c7:b7:fd:
8b:78:b0:b3:0c:4e:6e:35:4a:89:38:d0:a9:be:b1:05:76:6c:
d0:ca:8e:44:7d:0f:50:93:d5:2a:75:ef:c5:5c:2a:5b:e6:d4:
3b:56:7f:28:d6:87:f0:a8:9d:36:85:a4:64:f4:2a:82:df:13:
27:cc
-----------------------END------------------------

CPE Certificate:
-----------------------START------------------------
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 257 (0x101)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=BH, ST=MANAMA, L=Bahrain, O=ZAIN Bahrain Telecom Company, OU=Z
AIN, CN=ZAIN Bahrain Telecom Company Root CA/emailAddress=samir.reyad@bh.zain.com
Validity
Not Before: Jul 23 06:49:02 2010 GMT
Not After : May 13 06:49:02 2035 GMT
Subject: C=BH, ST=MANAMA, O=ZAIN Bahrain Telecom Company, OU=ZAIN, CN=ZA
IN Bahrain Telecom Company Terminal/emailAddress=samir.reyad@bh.zain.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:b4:fa:31:e1:d8:c6:e8:9a:23:39:8b:ba:da:ad:
2d:99:1d:66:ca:a3:84:93:48:29:6a:b3:40:58:e0:
f6:40:02:42:19:ac:5f:94:91:66:4c:bd:71:80:1a:
e4:53:1c:2c:36:b1:48:94:6d:ee:e5:c1:f9:1a:be:
e2:f8:ec:62:54:7f:ff:55:d2:5c:c0:a8:40:11:9d:
73:4d:08:c2:75:68:e0:b7:d2:cd:f9:cd:56:f2:52:
cd:ee:21:a2:a0:c7:6f:da:c8:e4:2e:0a:14:57:ae:
3c:65:5a:da:43:9c:8e:1f:7c:06:34:55:6d:af:17:
08:df:0b:5a:b9:f4:47:f8:cf
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
E8:C0:09:C6:D7:9D:A2:4F:6E:EF:B6:50:15:BF:BD:AA:D5:CB:69:01
X509v3 Authority Key Identifier:
keyid:25:2D:F4:8A:03:FE:3A:1A:C3:48:A6:03:D1:A1:37:E9:93:DB:B0:28

Signature Algorithm: sha1WithRSAEncryption
43:f6:c5:2a:7a:05:70:e7:3a:62:2b:4b:67:76:a2:86:89:9e:
49:90:b5:8c:ed:41:cb:45:26:52:87:cf:ae:f5:48:21:c6:86:
8c:d5:df:22:7c:af:bd:aa:8d:29:42:8c:2d:2d:bd:7f:1d:e9:
da:a1:39:ea:68:43:44:81:95:20:22:76:ef:90:3f:df:fd:d5:
9d:41:49:ed:97:c7:38:90:e9:4e:27:87:c0:be:7a:dc:e2:04:
4e:7a:8a:0e:f7:13:6c:77:1d:60:f3:76:c1:78:c9:e6:74:26:
b7:ab:1e:46:d4:6d:bb:5e:e1:6a:5b:27:b5:2d:b3:66:37:c8:
cd:34
-----------------------END------------------------

End!

53 comments:

ali said...

Do you have Firmware For this Model ??

Root Shell said...

No I don't have..

I just the dumped the flash.

ali said...

SO do you have other solve to rest the flash
not setting ?

Root Shell said...

Yes, you can write the dumped flash (mtd1, mtd2, etc..) back to the device using tftp.

There are two flash inside Huawei BM635, one deals with the VOIP, LAN, WIFI and the other with Wimax.

ali said...

I trying to back wimax flash but not coming complete
Can u plz give me your mail adrs and invite me to your private blog

AND THANKS

Root Shell said...

Which flash are you trying to backup?

ST M29W640FT or Spansion FL032AIF

ali said...

I dunno witch one >> I delete the eth 01
and now I need back like before

Root Shell said...

You mean the eth1 interface is not available.

eth1 is wimax interface.
So your wan mac will be BLANK.

Firmware re-flash or upgrade will not fix your problem because wimax module is not responding.

It might be due to corrupted bootloader of wimax module or some hardware problem..

If you had used "setallmacaddr" command many times then there's much chances of this to happen.

Lastly, my email is mentioned at the bottom of this blog root@covertbay.com

knytwarrior said...

do u know how to backup the flash of
ST M29W640FT

i have firmware of some huawei wimax modem ill share it to you

knytwarrior said...

the result of blank wan is invalid mac vendor address that you input for example you input setallmacaddr 308750223344 this will result for blank wan the eth1 will rename as usb0 on ifconfig

the first 6 digits is the mac vendor address

please check the huawei mac vendor address
before u change your mac
huawei mac vendor address
20:2B:C1
24:DB:AC
28:5F:DB
28:6E:D4
30:87:30
40:4D:8E
4C:1F:CC
4C:54:99
54:89:98
54:A5:1B
5C:4C:A9
64:16:F0
78:1D:BA
80:FB:06
84:A8:E4
BC:76:70
CC:96:A0
F4:C7:14

knytwarrior said...

ill post the solution for blank wan for bm625,bm635,and bm626 if Root Shell permitted

tRilobites said...

knytwarrior do you have a BM622i and BM622 Firmware?

I need those two firmware.
Glad if you spare those firmwares.
I'm looking forward to your blank wan solution.

tRilobites said...

rootshell can you decrypt this for me?

Rootcacert.pem
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Root Shell said...

Certificate:
Data:
Version: 3 (0x2)
Serial Number:
bd:5e:c0:26:24:14:67:72
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=CN, ST=Guangdong, O=Huawei Technologies Co. Ltd., OU=WiMAX For
um(R) Devices, CN=Huawei WiMAX Root CA
Validity
Not Before: Jun 8 03:00:20 2009 GMT
Not After : Jun 3 03:00:20 2029 GMT
Subject: C=CN, ST=Guangdong, O=Huawei Technologies Co. Ltd., OU=WiMAX Fo
rum(R) Devices, CN=Huawei WiMAX Root CA
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:e8:c1:4a:97:e2:5a:63:93:1e:b7:66:83:34:15:a4:f5:5f:c2:de:1e:74:2f:86:30:bc:17:3a:be:7c:47:82:c7:ca:1b:a6:d0:dc:e1:d4:c6:c1:f1:14:93:5a:24:86:fb:50:e8:49:64:8e:25:73:87:e3:59:0b:ef:7f:9b:9f:da:43:e0:7f:be:f3:43:71:d0:8b:58:c1:ab:ff:88:c7:7a:68:8b:c7:38:9b:ea:f5:3d:a1:f9:c8:dd:57:16:e7:60:fd:73:b6:a0:b4:9e:f2:06:52:b2:97:43:c2:17:ab:d1:4d:b7:18:b3:7a:2a:55:22:e9:68:04:5e:0a:c7:d2:37
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
76:17:C5:01:5F:27:D7:31:30:E2:BC:7B:1B:15:54:37:A2:F3:87:2E
X509v3 Authority Key Identifier:
keyid:76:17:C5:01:5F:27:D7:31:30:E2:BC:7B:1B:15:54:37:A2:F3:87:2E
DirName:/C=CN/ST=Guangdong/O=Huawei Technologies Co. Ltd./OU=WiM
AX Forum(R) Devices/CN=Huawei WiMAX Root CA
serial:BD:5E:C0:26:24:14:67:72

X509v3 Basic Constraints:
CA:TRUE
X509v3 Key Usage:
Certificate Sign, CRL Sign
Signature Algorithm: sha1WithRSAEncryption
76:e7:35:b1:9f:e7:11:d1:cd:3b:8f:14:98:c6:19:45:b5:07:73:f6:f2:e8:0a:05:01:ed:c8:48:fa:b0:81:ab:29:4e:e1:9f:02:84:5c:70:67:9b:2e:97:32:b8:0a:b0:73:3a:06:b4:87:90:1a:99:17:e4:c6:67:f3:b1:1f:80:a1:c6:dc:cb:9e:17:b7:9e:43:37:c0:bd:b6:93:f2:5b:6c:e2:ee:4a:cc:b0:22:69:07:8a:15:76:a9:bb:39:99:ff:bb:e8:d4:ca:c9:00:a4:d6:71:cb:b3:77:09:36:3e:c3:75:87:ab:c6:31:a4:8e:61:b4:0c:17:9a:37:8c:f3

Root Shell said...

Hi knytwarrior,

You are most welcome. You can post your solution for blank wan & firmwares.

Thanks

zarlwilliam said...

so whats the blank wan fix? :)

would this modem work in the USA on the 2.5ghz band?

spectroplasm said...

Wonderfull Blog Root! I simply love it, I didn't know anyone else was interrested in these blender type boxes that huawei makes.
I have two of these boxes BM 652 (the difference between the 622 and the 652 is the frequency range our country operates on 2.3~2.4Ghz): 1 is working well while another has the dread blank WAN (blank Wimax address) symptom. I did notice that when this happens the root certificates also dissapear (no pem files in the certificate panel). I dumped the certificates from the working and tried to upload them back into the blank WAN device but wont work. I'm wondering how to rename that USB0 in ifconfig back into eth1 to get the wan back.

spectroplasm said...

wondering how to do a complete dump of the existing working firmware to put on the other box although I'm certain that's not the solution of this problem, I'm more into thinking it's a bad nand or worse yet a dead nand. anyone got the JTAG points of hits unit to parallel port?

knytwarrior said...

@spectroplasm

what isp use bm652 maybe i have a firmware of it


blank wan cause wrong or invalid mac vendor address you inout in setallmacaddr

the wimax flash is not responding u need to dump working wimax flash then flash it to ur blank wan or maybe it can be solve by firmware

ive alredy tried the bm625 bm635 bm632 bm631a blankwan solve by firmware upgrade


this blog help a lot im wondering why my friend rootshell not put a donation for his projects


making blog its hard its time consuming

knytwarrior said...

bm632 and bm652 are used in madagascar

spectroplasm said...

yes this is correct, bm632 and bm652 are in madagascar, the ISP is LIR (aka blueline). I've tried the setall command with a valid vendor but it wont go it says success for WAN LAN but Wimax stays blank. I have the certificate if anyone wants to decrypt it. I need a firmware though, or I'm also wondering how to get the firmware out of the working one.

knytwarrior said...
This comment has been removed by the author.
spectroplasm said...

oki doki doc mate, you can check on my blog site for the picture if you want, I'll send them to you via mail anyhow to avoid your trouble having to surf all the way there :).

spectroplasm said...

mail sent, will send you the interface later on as I'm not in front of the box right now.

Mehran said...

hi Dears , i looking for Solution for Blank Mac ,

please Some one help me how can i do it .

Regards .

Darius said...

hi,would you be able to send me the firmware of bm622 AND bm622i.Looking forward. Thanks by the way.Here's my email:quatre_101@yahoo.com

Toxotes said...

hi, does anyone here have a firmware for bm652 please send me one at my email jabevangelista@yahoo.com i'll just brick my bm652 thanks in advance..

rm said...

where can i find on my bm635 this x509 certificate? can u tell me? how can i decrypt? thanks.

rm said...

found all! but what can i do with rsa key? can i get access as admin profile?

UltraGM said...

Please guys if anyone have firmware for BM635 my email is freemuyis@yahoo.co.uk send it to me.

And what will likely happen if i use another device firmware for my BM635. let say i use BM632w firmware

casshern said...

@knytwarrior can you please send me a firmware of bm622 and kindly please tell me how do it..

coz my bm622 cant access gui and telnet after i changed mac with a wrong one...

and i here read some thread about the full protection of bm622 from FD via hardware level protection its like some sort of making your flash read only!

looking forward for some tutorial..

regardz

heres my email hitman27reborn@yahoo.com

rindra.it said...
This comment has been removed by the author.
mhomho said...

need to hack bm626 WIMAX CPE PLEASE HELP ME

mhomho said...

i want to save the google dns in my cpe how to do?

leo ruel lumibay said...

hi.. im using bm622 wimax..only the Lan LED is on.. i think the firmware is destroyed.. i need help to reinstall the firmware.. lease help..
- 1 thing.. i have huawei MAC changer and also Mac scanner for huawei wimax modems.. and im willing to share it.. when i got my bm622 back to life,,

leo ruel lumibay said...

i also have the wimax hardware protection circuit diagram,,, to share,, this hardware circuit will block FD and let you use the net as long as you want,,

mhomho said...

morning leo for the firmware go to my download to the top of this page you will get it there

mhomho said...

morninn please help i want to decrypt this

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Rija Hasina RAKOTO-JEAN said...

I need help for my huawei bm652, If you can send me some macaddress, I could work ! HELP HELP ! Thanks very much

rija mahafinaritra said...

I need help to my Huawei BM 652, can you help me please, macadress don't work... if there's free mac address for Madagascar, blueline.mg, you're welcome. HELP HELP HELP! thank you very much!

devilsofthacker said...

I need your help to my Huwei BM328, pls i can't find firmware. And also help to decrypt CAcertRoot

devilsofthacker said...

Help to decrypt this


-----BEGIN CERTIFICATE-----
MIIDjjCCAvegAwIBAgIJAL1ewCYkFGdyMA0GCSqGSIb3DQEBBQUAMIGIMQswCQYD
VQQGEwJDTjESMBAGA1UECBMJR3Vhbmdkb25nMSUwIwYDVQQKExxIdWF3ZWkgVGVj
aG5vbG9naWVzIENvLiBMdGQuMR8wHQYDVQQLExZXaU1BWCBGb3J1bShSKSBEZXZp
Y2VzMR0wGwYDVQQDExRIdWF3ZWkgV2lNQVggUm9vdCBDQTAeFw0wOTA2MDgwMzAw
MjBaFw0yOTA2MDMwMzAwMjBaMIGIMQswCQYDVQQGEwJDTjESMBAGA1UECBMJR3Vh
bmdkb25nMSUwIwYDVQQKExxIdWF3ZWkgVGVjaG5vbG9naWVzIENvLiBMdGQuMR8w
HQYDVQQLExZXaU1BWCBGb3J1bShSKSBEZXZpY2VzMR0wGwYDVQQDExRIdWF3ZWkg
V2lNQVggUm9vdCBDQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA6MFKl+Ja
Y5Met2aDNBWk9V/C3h50L4YwvBc6vnxHgsfKG6bQ3OHUxsHxFJNaJIb7UOhJZI4l
c4fjWQvvf5uf2kPgf77zQ3HQi1jBq/+Ix3poi8c4m+r1PaH5yN1XFudg/XO2oLSe
8gZSspdDwher0U23GLN6KlUi6WgEXgrH0jcCAwEAAaOB/TCB+jAdBgNVHQ4EFgQU
dhfFAV8n1zEw4rx7GxVUN6Lzhy4wgb0GA1UdIwSBtTCBsoAUdhfFAV8n1zEw4rx7
GxVUN6Lzhy6hgY6kgYswgYgxCzAJBgNVBAYTAkNOMRIwEAYDVQQIEwlHdWFuZ2Rv
bmcxJTAjBgNVBAoTHEh1YXdlaSBUZWNobm9sb2dpZXMgQ28uIEx0ZC4xHzAdBgNV
BAsTFldpTUFYIEZvcnVtKFIpIERldmljZXMxHTAbBgNVBAMTFEh1YXdlaSBXaU1B
WCBSb290IENBggkAvV7AJiQUZ3IwDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAQYw
DQYJKoZIhvcNAQEFBQADgYEAduc1sZ/nEdHNO48UmMYZRbUHc/by6AoFAe3ISPqw
gaspTuGfAoRccGebLpcyuAqwczoGtIeQGpkX5MZn87EfgKHG3MueF7eeQzfAvbaT
8lts4u5KzLAiaQeKFXapuzmZ/7vo1MrJAKTWccuzdwk2PsN1h6vGMaSOYbQMF5o3
jPM=
-----END CERTIFICATE-----

James Villegas said...

may i know how to dump the image for bm622 andbm622i?

navs said...

@ devilsofthacker

Certificate:
Data:
Version: 3 (0x2)
Serial Number:
bd:5e:c0:26:24:14:67:72
Signature Algorithm: sha1WithRSAEncryption
Issuer:
commonName = Huawei WiMAX Root CA
organizationalUnitName = WiMAX Forum(R) Devices
organizationName = Huawei Technologies Co. Ltd.
stateOrProvinceName = Guangdong
countryName = CN
Validity
Not Before: Jun 8 03:00:20 2009 GMT
Not After : Jun 3 03:00:20 2029 GMT
Subject:
commonName = Huawei WiMAX Root CA
organizationalUnitName = WiMAX Forum(R) Devices
organizationName = Huawei Technologies Co. Ltd.
stateOrProvinceName = Guangdong
countryName = CN
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:e8:c1:4a:97:e2:5a:63:93:1e:b7:66:83:34:15:
a4:f5:5f:c2:de:1e:74:2f:86:30:bc:17:3a:be:7c:
47:82:c7:ca:1b:a6:d0:dc:e1:d4:c6:c1:f1:14:93:
5a:24:86:fb:50:e8:49:64:8e:25:73:87:e3:59:0b:
ef:7f:9b:9f:da:43:e0:7f:be:f3:43:71:d0:8b:58:
c1:ab:ff:88:c7:7a:68:8b:c7:38:9b:ea:f5:3d:a1:
f9:c8:dd:57:16:e7:60:fd:73:b6:a0:b4:9e:f2:06:
52:b2:97:43:c2:17:ab:d1:4d:b7:18:b3:7a:2a:55:
22:e9:68:04:5e:0a:c7:d2:37
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
76:17:C5:01:5F:27:D7:31:30:E2:BC:7B:1B:15:54:37:A2:F3:87:2E
X509v3 Authority Key Identifier:
keyid:76:17:C5:01:5F:27:D7:31:30:E2:BC:7B:1B:15:54:37:A2:F3:87:2E
DirName:/C=CN/ST=Guangdong/O=Huawei Technologies Co. Ltd./OU=WiMAX Forum(R) Devices/CN=Huawei WiMAX Root CA
serial:BD:5E:C0:26:24:14:67:72

X509v3 Basic Constraints:
CA:TRUE
X509v3 Key Usage:
Certificate Sign, CRL Sign
Signature Algorithm: sha1WithRSAEncryption
76:e7:35:b1:9f:e7:11:d1:cd:3b:8f:14:98:c6:19:45:b5:07:
73:f6:f2:e8:0a:05:01:ed:c8:48:fa:b0:81:ab:29:4e:e1:9f:
02:84:5c:70:67:9b:2e:97:32:b8:0a:b0:73:3a:06:b4:87:90:
1a:99:17:e4:c6:67:f3:b1:1f:80:a1:c6:dc:cb:9e:17:b7:9e:
43:37:c0:bd:b6:93:f2:5b:6c:e2:ee:4a:cc:b0:22:69:07:8a:
15:76:a9:bb:39:99:ff:bb:e8:d4:ca:c9:00:a4:d6:71:cb:b3:
77:09:36:3e:c3:75:87:ab:c6:31:a4:8e:61:b4:0c:17:9a:37:
8c:f3
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

goli konan pacome said...

hello friends I have a wimax modem that I have seen hacked for unlimited connection without paying i learned that could do it with a certificate that put the root of the wimax if this assertion is confirmed thank you to answer me

desbill said...

hello friends please tell me how to get unlimited connection with a certificate on a wimax modem. decriptez this file for me and also show me the procedur

cpekey.pem
----- BEGIN RSA PRIVATE KEY -----
MIICWwIBAAKBgQDP9gWLYUlfXCabe1EvaFNOTzaLRmv/7vzJqrlA 9 toZ/J2tdBd
HreZnUWkad6i2pm7SPGOgS + dvLBVLnKC4ncmYUrDeFjcqt4lGhPqqUSiDruXjomn
pz 2 + Ili6QcgqGKOTsrHajKt00TES15sSi Zy0GmlCV/5vSgPH0uZcFeMlQIDAQAB
+ + AoGAV ggSd2y/UtfyoOjOs33wPd9D/yRtJsaYkj3jD qbITcGlAapvJQG / A + OxTB
lsefCmr4KQv0y9GyHB/JKgh 4 ohRZqrnEDgiwpMY97feYm/YUVFuUExw7elz4ZFb
TWaZ4OO8hQqzUmjMq4cvStu1AZfUBfjYsp7aBqLO/tAB5IECQQDp/MOPmm7FWY + s
dDR3cNoBZzAxak7NvsAwrE3PVDuxhBKBBqiWMhoXHMh1iz52ArXXkJxyPpVr6Z + a
XI3zLVNhAkEA44ZzyXTtHSXunPzTEIzH7gh6rfSvN5VAG5eRGB2A6vXHDwCesFwy
y8GeX 3 I4FcIqAfXJyJSJQxMovE6rps5tQJARFUHu3FLNiEAn0lUZSk00UIUReoY
12cEc3JuSsT7pcy/JqUOKMa67dL/C6y9cfM6rZhSx95U/q28aXTsE39CIQJAbfWX
1d/tjG29oR9K/i + bnD161MFxQOKfxfX9SHNRz7wShPyetMsKPZEIcoIf19QYOeT4
JVCf9Im6K/F7k9EvFQJAVh8iN9i9lyZnWz/QAZCZ/R5CE2df4yh3UrWUfuHwLKfR
n1u3nbg9YITLE5cTDAF4VCtQgJTXnd1npHNBN3u4Mw ==
----- END RSA PRIVATE KEY -----

aldrin tagoon said...

hi,would you be able to send me the firmware of bm622 AND bm622i.Looking forward. Thank you in advance....

Btw, here is my email address youngloccvl@gmail.com

Thanks again.

goli konan pacome said...

help me brother, I have a problem with my ECHOLIFE bm626 Ivory Coast of my mac address wan is not and I do not know how to respond here thank you page interface

http://img580.imageshack.us/img580/3175/prtscrcapturej.png

http://img547.imageshack.us/img547/1319/prtscrcapture2z.png

http://img194.imageshack.us/img194/4952/prtscrcapture3fo.png

http://img812.imageshack.us/img812/351/prtscrcapture4p.png

http://img21.imageshack.us/img21/5999/prtscrcapture5k.png

steven vasal said...

hello i need help on this error message..i just want to get wmx_client_ca.pem and wmx_priv_key.key but everytime i use the command cat /sbin/wimax_cert_update.sh i got this error message and i cannot view to contains of the files... # cat /etc/wimax_cert_update.sh
#!/bin/sh
# @author Shane
#
# Derived from platform_update.sh
#
#

error_exit()
{
rm -f /var/wimax_cert_update.lock
exit 1
}

if [ -f /var/wimax_cert_update.lock ]; then
echo "wimax_cert_update is locked"
exit 1
fi
touch /var/wimax_cert_update.lock

if [ "$1" == "" ] ; then
echo "Usage : $0 [file | http url | tftp url]"
error_exit
fi

argv=$@

image_tar="/tmp/wimax_cert"
image_client_ca1="wmx_client_ca1.pem"
image_root_ca1="wmx_root_ca1.pem"
image_priv_key1="wmx_priv_key1.key"
image_client_ca2="wmx_client_ca2.pem"
image_root_ca2="wmx_root_ca2.pem"
image_priv_key2="wmx_priv_key2.key"
client_ca="wmx_client_ca.pem"
root_ca="wmx_root_ca.pem"
priv_key="wmx_priv_key.key"

tmp_cert_dir="/etc/tmp/cert"
cert_dir_loc="/etc"
cert_dir="/etc/cert"
log_file="/var/log/wimax_cert_update"

http=`echo $argv | grep "^http"`
tftp=`echo $argv | grep "^tftp://"`

mkdir -p $tmp_cert_dir
mkdir -p $cert_dir

if [ -n "$http" ] ; then
echo "<< HTTP mode >>"
echo "-----------------------------------------"
rm -rf ${image_tar}
echo -n "Download WiMAX Certificate ... "
rm -rf ${log_file}
wget --timeout=10 ${argv} -O ${image_tar} -q 2>${log_file}
ret=$?
if [ $ret == 0 ] ; then
echo "OK"
else
ret=`cat ${log_file}`
echo "Failed ($ret)"
error_exit
fi
elif [ -n "$tftp" ] ; then
echo "<< TFTP mode >>"
file=$argv
file=${file#*/}
file=${file#*/}
path=${file#*/}
addr=${file%%/*}
echo "Server address : $addr"
echo "Image path : $path"
echo "-----------------------------------------"
echo -n "Download WiMAX Certificate ... "
tftp -g -r "$path" -l $image_tar $addr 2>${log_file}
ret=$?
if [ $ret == 0 ] ; then
echo "OK"
else
ret=`cat ${log_file}`
echo "Failed ($ret)"
error_exit
fi
else
echo "<< FILE mode >>"
echo "File name : $argv"
echo "-----------------------------------------"
if [ -f $argv ] ; then
image_tar=$argv
else
echo "File not exist ... Failed"
error_exit
fi
fi

echo -n "Upgrade WiMAX Certification ... "
mv $image_tar $tmp_cert_dir/$root_ca
mv -f $tmp_cert_dir/* $cert_dir
if [ -f $cert_dir/$root_ca ]; then
rm -f $cert_dir_loc/$root_ca
ln -s $cert_dir/$root_ca $cert_dir_loc/$root_ca
fi
#tar zxf $image_tar -C $tmp_cert_dir
#if [ -f $cert_dir/$image_client_ca1 ]; then
# rm -f $cert_dir_loc/$client_ca
# ln -s $cert_dir/$image_client_ca1 $cert_dir_loc/$client_ca
#fi
#if [ -f $cert_dir/$image_root_ca1 ]; then
# rm -f $cert_dir_loc/$root_ca
# ln -s $cert_dir/$image_root_ca1 $cert_dir_loc/$root_ca
#fi
#if [ -f $cert_dir/$image_priv_key1 ]; then
# rm -f $cert_dir_loc/$priv_key
# ln -s $cert_dir/$image_priv_key1 $cert_dir_loc/$priv_key
#fi
echo "OK"

rm -f /var/wimax_cert_update.lock

if [ $? == 0 ] ; then
echo "OK"
if ! [ $NO_REBOOT == 1 ]; then
reboot
fi
else
echo "Failed"
echo "Reason : "
cat ${log_file}
fi
#
pls.email me your help thanks

steven vasal said...

pls.email me your help thanks ...stevenvasal15@gmail.com

Baktash Aalam said...

i need a English version of firmware Huawei Echolife BM635
pls email me baktash.aalam@live.com

Osama Aqeel said...

I need Zain Bahrain firmware for Huawei Echolife BM635
Please, email me on aus71@hotmail.com

Unknown said...

hello , i really need some help.
iam trying to port forward the port 80 on my wimax echolifebm626 router but
this message appear ( port 80 busy)
please help

Post a Comment