
/cloudfront-eu-central-1.images.arcpublishing.com/madsack/BNP5XFDGPZDCVH23NOSTIQJPMA.jpeg)
Really the only thing I was interested in is this line:ħ-Zip 16.02 : Copyright (c) 1999-2016 Igor Pavlov : Once I downloaded the firmware image, I unziped TL-WA701ND_V2_130528.zip which contains wa701nv2_en_3_16_6_up_boot(130528).bin. The firmware is the third version from the top at this webpage: Extacting the U-Boot Bootloader from the firmware image
#U boot image software#
Please go to TP-Link Offical Website to get products, software and services for your region.
#U boot image download#
_Warning: I had to navigate through TP-Link’s support pages to actually download the firmware, the direct link showed me a screen that said: Read the whole thread hereĪs part of the twitter thread, the original researcher and author published a link to the firmware for the router he was looking at - () in his tweet here.

According to the tweet, that “escape sequence” is the string tpl, entered in right after the Autobooting in.
#U boot image series#
The background on this is that the TP-Link WA701Nv2 Series WiFi Access Point / Router uses Das U-Boot as a bootloader and also has an “escape sequence” that breaks into the U-Boot shell during the boot cycle. I recently saw a tweet that struck my curiosity. Project maintained by nstarke Hosted on GitHub Pages - Theme by mattgraham 01 December 2020 Loading Das U-Boot Images in Ghidra Background
