update docs
parent
dd2e15f959
commit
d454267ea5
|
@ -4,13 +4,13 @@ Several models of Netgear devices have a hidden telnet daemon that can be
|
|||
enabled for remote LAN users by sending a 'magic packet' to the device.
|
||||
Upon successful connect, a root shell should be presented to the user.
|
||||
|
||||
There are many devices which contain this daemon, for a full list see [OpenWrt](https://wiki.openwrt.org/toh/netgear/telnet.console)
|
||||
There are many devices which contain this daemon, for a full list see [OpenWrt](https://wiki.openwrt.org/toh/netgear/telnet.console).
|
||||
|
||||
This module has been successfully tested against:
|
||||
|
||||
- AC1450 in whatever version I bought it with (TCP)
|
||||
- AC1450 latest V1.0.0.36_10.0.17 (UDP)
|
||||
- N300 WNR2000 v3 V1.1.2.10 (TCP)
|
||||
- AC1450 - unknown older firmware (TCP)
|
||||
- AC1450 - latest firmware: V1.0.0.36_10.0.17 (UDP)
|
||||
- N300 WNR2000 v3 - firmware: V1.1.2.10 (TCP)
|
||||
|
||||
## Setup
|
||||
|
||||
|
@ -77,6 +77,8 @@ You can leave this blank to use the default password.
|
|||
|
||||
## Usage
|
||||
|
||||
### AC1450
|
||||
|
||||
As a normal user:
|
||||
|
||||
```
|
||||
|
|
Loading…
Reference in New Issue