After receiving a T-Mobile TMOHS1 hotspot, I was left craving a little more. I hopped on eBay, searched up for an MR1100 hotspot, and found an ATT model with a bad SIM reader for ~$50! Bought it, took a small knife to the gold contacts on the reader, and pushed them up a little, and we're up and running!
I've been using the T-Mobile $10 business unlimited tablet plan, and I have read online that T-Mobile specifically blocks the IMEIs of MR1100s unless they're on specific hotspot plans. So my first step in my plan was to modify/perform magic/change/alter/etc. the IMEI.
I have gone ahead and flashed my ATT hotspot to the generic software, as I don't need the LAA feature, and I trust Netgear's firmware a little more than ATT's.
In online forums, modifying the IMEI is typically referred to as "performing magic" on a device. Modification of the IMEI is a legal gray area in the US as you're only supposed to change the IMEI to a device you already own, i.e. a tablet. I won't be delving into how to obtain a tablet IMEI in this guide, sorry!
Regardless, let's hop right into it!
First, connect the MR1100 to your computer via USB, and use your favorite telnet client to telnet to your hotspot's IP at port 5510. Nothing will automatically display, but you should be able to type
ati and get a response.
ati ati Manufacturer: Netgear, Incorporated Model: MR1100 Revision: NTG9X50C_12.06.11.00 r3831 ntgrbc-fwbuild4 2020/01/24 17:46:40 IMEI: xxx IMEI SV: 13 FSN: xxx +GCAP: +CGSM OK
Unlocking the Advanced Settings
We need to clone this Replit repo, as this gives us the script needed to modify the IMEI all in one place. In the Shell tab, we need to run
pip3 install -r requirements.txt
~/TreasuredTornRouter$ pip3 install -r requirements.txt Collecting pyserial Using cached pyserial-3.5-py2.py3-none-any.whl Installing collected packages: pyserial Successfully installed pyserial-3.5 WARNING: You are using pip version 21.2.dev0; however, version 22.0.4 is available. You should consider upgrading via the '/opt/virtualenvs/python3/bin/python3 -m pip install --upgrade pip' command.
Back in PuTTY, we need to type
AT!OPENLOCK? to get the string needed to get the unlock token. Copy the string to your clipboard.
AT!OPENLOCK? 1240396BFCEA38E7 OK
Now we need to enter the command
./sierrakeygen.py -l 'string' -d MDM9x50_v1, replacing 'string' with the string you copied and without quotes.
~/TreasuredTornRouter$ ./sierrakeygen.py -l 1240396BFCEA38E7 -d MDM9x50_V1 AT!OPENLOCK="BCC54829A0CBE8DE"
The output of that command is what we need to copy and paste into PuTTY to unlock the advanced settings on the device.
AT!OPENLOCK="BCC54829A0CBE8DE" AT!OPENLOCK="BCC54829A0CBE8DE" OK
AT!NVIMEIUNLOCK AT!NVIMEIUNLOCK OK
Now here's where we put in our IMEI. For example, if the IMEI we want to change it to is 123456789012347, we type
AT!NVENCRYPTIMEI=12,34,56,78,90,12,34,70 AT!NVENCRYPTIMEI=12,34,56,78,90,12,34,70 OK
ATI to verify our changes applied, and then type
ati ati Manufacturer: Netgear, Incorporated Model: MR1100 Revision: NTG9X50C_12.06.11.00 r3831 ntgrbc-fwbuild4 2020/01/24 17:46:40 IMEI: 123456789012347 IMEI SV: 13 FSN: xxx +GCAP: +CGSM AT!RESET AT!RESET OK
I've read online a lot of places that claim that modifying the TTL on the MR1100 is not possible. This couldn't be further from the truth. We just need to enable the root telnet shell, and then create a script that runs on boot to masquerade the TTL.
First, we need to enable the advanced settings of the hotspot as we did above with the python script. After that, enter
AT!TELEN=1, followed by
AT!CUSTOM="RDENABLE", 1. Then reboot the device.
AT!TELEN=1 AT!TELEN=1 OK AT!CUSTOM="RDENABLE", 1 AT!CUSTOM="RDENABLE", 1 OK
Now we need to open a new telnet session, this time at the standard telnet port. You should be dropped straight into a shell.
msm 202001241807 mdm9650 / #
Now simply just enter the following commands and reboot the device!
echo "iptables -t mangle -I POSTROUTING -o rmnet_data+ -j TTL --ttl-set 64" > /etc/init.d/ttl.sh echo "ip6tables -t mangle -I POSTROUTING -o rmnet_data+ -j HL --hl-set 64" >> /etc/init.d/ttl.sh chmod 755 /etc/init.d/ttl.sh ln -s /etc/init.d/ttl.sh /etc/rc5.d/S98ttl
Note, I recommend after rebooting to disable the root shell telnet. This can be done by entering the advanced settings in the port 5510 telnet session and entering
AT!CUSTOM="RDENABLE", 0, and rebooting once more.
AT!TELEN=0 AT!TELEN=0 OK AT!CUSTOM="RDENABLE", 0 AT!CUSTOM="RDENABLE", 0 OK
Using IPv6 DNS Servers
A step up from the TMOHS1 hotspot, this one lets us specify the DNS servers for our clients. However, it will only let us use IPv4 servers...sigh. The resolv.conf file for this device is stored in
/mnt/userrw/swietc/resolv.conf. So we simply create a script in
/etc/init.d/customdns.sh with the contents:
#!/bin/sh (while true do echo "nameserver 2606:4700:4700::1111" > /mnt/userrw/swietc/resolv.conf sleep 15 done) &
Make it executable:
chmod 755 /etc/init.d/customdns.sh
ln -s /etc/init.d/customdns.sh /etc/rc5.d/S98customdns.