Hacking the FON router

Hacking the FON router

Steve writes – “I’ve just received my $25 Linksys WRT54GL from FON, as part of their promotion, and have gone through the code to find out how it phones home to let FON know it’s connected. The article I’ve linked to here is what I’ve found out – mainly that the router they supply sends a heartbeat with its MAC address to a URL at fon.com.”Link.

8 thoughts on “Hacking the FON router

  1. FriedPope says:

    So if I understand correctly this router is not reflashable, you can’t put Open-WRT on it. Oh well, I’d like to see someone get around the firmware and make this thing usable outside the corporate bubble.

  2. IrregularShed says:

    Nope – it is reflashable. The FON software is based on OpenWRT. This includes the admin panel’s ‘update firmware’ page, which I used about four minutes after unpacking it.

    (I wrote the article linked to.)

    The thing is, FON want you to use this with FON and threaten to take their ball home if you won’t play their game. So, if you feel so inclined, you can send fake heartbeats back to them, based off a cron job or whatever, to make them feel all warm. Meanwhile you open it up and fit a SD card reader, and get up to high jinks =)

  3. jovino says:

    the article has been pulled

  4. paulbeard@gmail.com says:

    So why was the article pulled?

Comments are closed.

Discuss this article with the rest of the community on our Discord server!

current: @adafruit - previous: MAKE, popular science, hackaday, engadget, fallon, braincraft ... howtoons, 2600...

View more articles by Phillip Torrone