Skip to content

Reverse engineering toolkit for ZTE MC7010/D: EDL unbrick, raw dump restoration, WebUI login bypass & custom firmware tools.

Notifications You must be signed in to change notification settings

mobot95/ZTE-MC7010-Toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ› οΈ ZTE MC7010 / MC7010D Toolkit

Repository dedicated to reverse engineering, modding, and recovery of ZTE MC7010 and MC7010D 5G outdoor routers (Qualcomm SDX55 Platform).

This project collects tools, scripts, and technical documentation to manage memory dumps, debrand devices, and recover lost administrative access without knowing the password.


⚠️ Disclaimer & Warnings

Important

READ CAREFULLY BEFORE PROCEEDING

Warning

BRICK RISK The procedures described here (EDL, Repack, Flash) involve significant risks. A single mistake can render the device unusable (brick).

Note

LIABILITY The author assumes no responsibility for hardware damage, data loss, or voiding of the warranty. Use at your own risk.


πŸ“š Guides & Documentation

πŸ”“ 1. Login Bypass (Pass-the-Hash)

Lost your router's label, forgot the credentials, or bought a locked unit?

This technique allows you to regain administrative access to the Web Interface and reset the password without knowing the original one. It works by using the SHA256 Hash of the password, which can be recovered from a system dump, bypassing the need for the plain-text password.

πŸ“– Read full guide: Login Bypass

2. Restore & RAW Dump Cleaning (EDL)

[TODO] Work in Progress This guide is currently being finalized.

Planned content:

  • Dump Cleaning: How to remove trailing padding (EE) from raw .bin dumps using the provided Python script.
  • UBI Rebuilding: Correctly extracting and reconstructing UBI partitions (system, modem, zterw, recoveryfs) to prevent bootloops.
  • Flashing Guide: Step-by-step instructions for properly flashing firmware using QFIL (Qualcomm Flash Image Loader) and EDL tools.
  • Device Configs: Specific configurations, Firehose programmers, and partition tables (rawprogram.xml) for MC7010 and MC7010D variants.

3. Custom Firmware (MC7010D)

⚑ Coming Soon Release of a pre-modified, ready-to-flash firmware for the MC7010D variant. Includes unlocked features and optimizations.


🧰 Required Tools

  • EDL Tool (bkerler/edl): For low-level memory reading/writing.
  • Ubidump (nlitsme/ubidump): To extract content from UBI partitions.
  • mtd-utils (Linux): To regenerate UBI images (mkfs.ubifs, ubinize).
  • Python 3: Required to execute the cleaning scripts.

πŸ“‚ Repository Structure

/
β”œβ”€β”€ guides/                          # Step-by-step technical documentation
β”‚   └── login_bypass.md
β”œβ”€β”€ tools/                           # Helper scripts
β”‚   └── clean_padding.py             # Removes trailing 0xEE/0xFF bytes from raw dumps
β”‚   └── login_with_hash.js           # Browser console script for Pass-the-Hash login
β”‚   └── password_change_with_hash.js # Browser console script for Pass-the-Hash change password
└── firmware/                        # Space for releases

About

Reverse engineering toolkit for ZTE MC7010/D: EDL unbrick, raw dump restoration, WebUI login bypass & custom firmware tools.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published