top of page

ZayFlex Results

Public·28 members
Mark Adrian Baring
Mark Adrian Baring

Disassembling Firmware Huawei Hg8245

Disassembling firmware huawei hg8245

The Huawei EchoLife HG8245 is a routing-type GPON ONT that provides 4 FE ports, 2 POTS ports, 1 USB port, and 1 Wi-Fi port. It is widely used for broadband access and voice services. However, some users may want to disassemble the firmware of the device for various reasons, such as modifying the configuration, unlocking hidden features, or analyzing the security vulnerabilities. In this article, we will introduce the steps and tools for disassembling the firmware of the Huawei HG8245.

Step 1: Downloading the firmware

The first step is to download the firmware file of the Huawei HG8245 from the official website. The firmware file is usually a ZIP archive that contains several files, such as a BIN file, a CFG file, and a XML file. The BIN file is the actual firmware image that we need to disassemble. The CFG file is a configuration file that contains some parameters and settings for the device. The XML file is a metadata file that describes the firmware version, model, and checksum.

Download File:

Step 2: Extracting the firmware

The next step is to extract the firmware image from the BIN file. The BIN file is encrypted and compressed using a proprietary algorithm by Huawei. Therefore, we need to use a special tool called Huawei Firmware Extractor to decrypt and decompress the BIN file. This tool can also extract other types of Huawei firmware files, such as RAR, EXE, or UPD files.

To use this tool, we need to run it from a command line and provide the BIN file as an input. For example:

huawei_firmware_extractor.exe HG8245_V1R006C00S100.bin

The tool will output several files in the same directory as the BIN file. The most important file is kernel.bin, which is the kernel image of the firmware. The other files are rootfs.bin, which is the root filesystem image of the firmware, and bootloader.bin, which is the bootloader image of the firmware.

Step 3: Disassembling the kernel

The kernel image is a binary executable file that contains the core functionality of the firmware. It is compiled for a specific CPU architecture, which in this case is MIPS. To disassemble the kernel image, we need to use a disassembler tool that supports MIPS instruction set, such as IDA Pro or Ghidra. These tools can analyze the binary code and generate assembly code and pseudocode that are easier to read and understand.

To use these tools, we need to open the kernel.bin file in them and select MIPS as the processor type. The tools will then automatically disassemble the code and display it in different views, such as hex view, graph view, or text view. We can also use various features of these tools, such as searching, commenting, renaming, or cross-referencing, to facilitate our analysis.

Step 4: Disassembling the root filesystem

The root filesystem image is a binary data file that contains all the files and directories that are stored in the device's flash memory. It is usually formatted using a standard filesystem type, such as SquashFS or JFFS2. To disassemble the root filesystem image, we need to use a tool that can mount and extract it, such as binwalk or unsquashfs. These tools can scan and identify different types of data segments in the image, such as compressed blocks, executable files, or plain text files.

To use these tools, we need to run them from a command line and provide the rootfs.bin file as an input. For example:

binwalk -e rootfs.bin

The tools will output a directory that contains all the extracted files and directories from the image. We can then browse and inspect them using any file manager or editor. Some of these files may be executable binaries that are also compiled for MIPS architecture. We can use the same disassembler tools as in step 3 to disassemble them.


In this article, we have introduced the steps and tools for disassembling the firmware of the Huawei HG8245. By disassembling the firmware, we can gain a deeper understanding of the device's functionality, configuration, and security. However, we should also be aware of the potential risks and legal issues of modifying or reverse engineering the firmware, as it may violate the terms and conditions of the manufacturer or the service provider.


Welcome to the group! You can connect with other members, ge...


bottom of page