dkmgt-fwutil: New tool to manipulate TP-Link Omada firmware files #53
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This adds a new tool to create TP-Link Omada firmware files. This was created mostly by reverse engineering the firmware and bootloader on an ER8411. It also seems to be compatible with the firmware for the ER605 and possibly other models too.
Although the firmware contains an RSA signature, the bootloader's recovery mode doesn't seem to verify it, meaning that this can be used to create factory installation images through the recovery bootloader.
It's probably worth calling out that this adds the cJSON library to the project, which was used to parse/manipulate JSON partitions embedded in the firmware file. This library is licensed under the MIT license, which I believe is compatible with this project. If that's not the case, I can probably rewrite the JSON handling to use some other library that is more appropriate.