I just got my RT-AC86U from a local retailer today and have successfully flashed Asuswrt-Merlin. However, I found that an OEM plugin seems to be there:
It translates as "Netease UU Accelerator", and does not go away after a hard reset (using Method 2). The source of the webpage is located at /www/UUAccelerator.asp
I feel very suspicious about this so called accelerator, and I am unsure if it collects and uploads any traffic data.
Is it possible to remove all these OEM plugins and make sure that I have a clean system? Thanks!
I just got my RT-AC86U from a local retailer today and have successfully flashed Asuswrt-Merlin. However, I found that an OEM plugin seems to be there:
It translates as "Netease UU Accelerator", and does not go away after a hard reset (using Method 2). The source of the webpage is located at /www/UUAccelerator.asp
I feel very suspicious about this so called accelerator, and I am unsure if it collects and uploads any traffic data.
Is it possible to remove all these OEM plugins and make sure that I have a clean system? Thanks!
Very odd that it still showing after installing merlin firmware, i wouldn't touch it with a barge pole to be honest if it were mine. It must be being stored somewhere for it to still be there after flashing merlin firmware, makes you wonder what else could be lurking on there even though you hard reset and flashed merlin firmware to it.
Yes I bought the router from a Chinese online retailer.
I am wondering how this is done technically. The menu entry can be removed by deleting the corresponding lines in /www/require/modules/menuTree.js . My modification persists after reboot. However, if I flash the router again (through the web GUI), the file is restored to the version including the UUAccelerator, and all files have the same modification time Jan 31 04:56.
I will try rescue mode flashing later. If this is due to some official Asus region lock mechanism, I suspect that won't work either.
I hope at least I can find out what modifications are applied on the flashed firmware. Maybe there are "post-flash hook scripts" stored somewhere...
OldFox said:
1 A Chinese language menu/button item has appeared just under Adaptive QoS, which shows on hover "UUAccelerator.asp", only on ac-86u. It has the same icon as Adaptive QoS. My ac86u is likely Chinese sourced, but I always operate it in English.
It means you have a router from China, in which case the router will enable support for this Chinese-only service. The code to enable/disable that feature in the webui is closed source, and outside of my control.
How is this implemented? Clearly /www/require/modules/menuTree.js does not match any file in the merlin repo. I am also able to hide the menu entry by modifying menuTree.js.
I'd like to understand how the flashed files get modified, and how I can extract a diff with respect to the official merlin firmware.
Sorry I am new to this whole Asus router stuff and I misunderstood how the firmware works (and I did a wrong search on github). I thought the official menu should use i18n instead of directly including some Chinese characters, and I hypothesized that the configuration was somehow modified after the firmware got flashed.
You are right. This item is already in the official merlin release (link here). It is also in the firmware image, which can be found by extracting the image using binwalk -e.
Now I understand that there should be some closed source part for controlling whether to display this item. This can be traced down by searching get_ui_support, which reveals it is implemented in httpd
How is this implemented? Clearly /www/require/modules/menuTree.js does not match any file in the merlin repo. I am also able to hide the menu entry by modifying menuTree.js.
I'd like to understand how the flashed files get modified, and how I can extract a diff with respect to the official merlin firmware.
I Have the same issue... Can you describe the process steps for hiding the menu entry to me.
I am new to ASUS-WRT Merlin, having just installed their firmware for the first time. Thanks
I Have the same issue... Can you describe the process steps for hiding the menu entry to me.
I am new to ASUS-WRT Merlin, having just installed their firmware for the first time. Thanks
I did not try to hide the entry. I just found out that the reason is that the http server somehow reads the location code in the firmware and displays this menu entry. It does not seem to do much harm since everyone is using the same firmware.
I did not try to hide the entry. I just found out that the reason is that the http server somehow reads the location code in the firmware and displays this menu entry. It does not seem to do much harm since everyone is using the same firmware.
Interesting. So different regions share the same firmware, but the firmware would differentiate the menu entries based on the region code, is that right?
I have a Chinese-sourced AX88U with "Netease UU Accelerator" as well. My concern is that ASUS would potentially implement region-specific firmware for compliance, which reduces the privacy. I now live in the USA and definitely don't hope to get involved in any confusion of jurisdictions. But your response seem to have this clarified.
BTW, thank you for your effort exploring this issue.
I did not try to hide the entry. I just found out that the reason is that the http server somehow reads the location code in the firmware and displays this menu entry. It does not seem to do much harm since everyone is using the same firmware.
I did a review of this feature, please note that I am not running any code, so I don’t know how it works, but it is possible to download an unknown binary file from a server I don’t trust (non-asus server), which makes me feeling scared.
Here is my process, you can reproduce it:
I first searched the various directories of the firmware, because if it exists, the program must be somewhere. But I didn't find it, so I guessed it built in some binary files, I first tried to find the RC program.
I didn't find any traces in the source code of RC, so I started to search for precompiled binaries of RC. Sure enough, I found it:
Open the "private.o" binary file with a text editor, or unzip "/sbin/rc" file on your router and open ".rodata" with a text editor.
You will see something like this:
Search by Google, I found the complete source code. It seems that this is a reverse engineering of the asuswrt binary and modified the URL to make it compatible with Merlin.
I downloaded the main program, which is a binary file. Its download link can be adjusted according to different models, different versions and different SN, which means it can be used for targeted attacks.
So, I want to say that this feature can download any binary file from any server at any time, and no one can review whether the binary file is safe.
And this feature is built into RC, which means it cannot be removed.
I uploaded the file I downloaded today to the attachments, please remove the ".txt" extension to open the file.
I did a review of this feature, please note that I am not running any code, so I don’t know how it works, but it is possible to download an unknown binary file from a server I don’t trust (non-asus server), which makes me feeling scared.
Here is my process, you can reproduce it:
I first searched the various directories of the firmware, because if it exists, the program must be somewhere. But I didn't find it, so I guessed it built in some binary files, I first tried to find the RC program.
I didn't find any traces in the source code of RC, so I started to search for precompiled binaries of RC. Sure enough, I found it:
Open the "private.o" binary file with a text editor, or unzip "/sbin/rc" file on your router and open ".rodata" with a text editor.
You will see something like this:
Search by Google, I found the complete source code. It seems that this is a reverse engineering of the asuswrt binary and modified the URL to make it compatible with Merlin.
I downloaded the main program, which is a binary file. Its download link can be adjusted according to different models, different versions and different SN, which means it can be used for targeted attacks.
So, I want to say that this feature can download any binary file from any server at any time, and no one can review whether the binary file is safe.
And this feature is built into RC, which means it cannot be removed.
I uploaded the file I downloaded today to the attachments, please remove the ".txt" extension to open the file.
Well, I currently live in China. I bought it from an online retailer. It is local in the sense that I place the order online and pick it up at a local location in a few hours. I did not want to complicate background of the first post so I did not include the details.
I did a review of this feature, please note that I am not running any code, so I don’t know how it works, but it is possible to download an unknown binary file from a server I don’t trust (non-asus server), which makes me feeling scared.
On my system, a ping using Network Tools tab got a response from netease.com but not 163.com. I got the IP address for both, then put them into the BAN list in Skynet. Now both are being blocked. That's good, but I do not know if those individual IP addrs are a sufficient block, or if I need to block a /24 range or a ASIN range. Just to be safe, I blocked both /24 ranges but not sure if that is overkill or insufficient
I find a better way to disbale uu_plugin, change you territory_code from CN to other country in envram will disable uu_plugin
ssh to you router
envram set territory_code=US/01 (any country other than CN, CT)
envram commit
you can also modify nvram( in fact nvram will change automatically after reboot , because it load from envram)
nvram set territory_code=US/01 (any country other than CN, CT)
nvram commit
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.