@alexq thank you very much for helping me.
I followed wiki, then I bricked it... then I founded your post on the forum and unbricked it with UART. Now I have problem to reproduce steps from wiki because when I do cat /proc/cmdline I get
root@OpenWrt:~# ubiformat /dev/mtd9 -y -f /tmp/openwrt-mediatek-filogic-xiaomi_mi-router-ax3000t-initramfs-factory.ubi
libmtd: error!: cannot get information about "/dev/mtd9"
error 2 (No such file or directory)
ubiformat: error!: cannot get information about "/dev/mtd9"
error 2 (No such file or directory)
These steps you're following are for flashing from stock/a different bootloader.
You're not following them correctly, so I suggest you to just use the stock bootloader with OpenWrt and forget about it.
Just follow the easy method on the first post. Note that snapshot initramfs doesn't have LuCI, so replace this:
Using LuCI flash sysupgrade image openwrt-mediatek-filogic-xiaomi_mi-router-ax3000t-squashfs-sysupgrade.bin
where is everyone buying the global version of the AX3000T from? Pretty much all of the aliexpress ones are china version RD03 running firmware 1.0.47. Wouldn't it be easier to return the global one you got and get one of the RD03 models?
I just got a RD03 with firmware 1.0.47. Unsure which chip it has come with, but I will be checking that next.
I am confused after reading *note: this method is not supported by stock firmware version 1.0.47 (CN). under SSH Exploit Method. That is because under Firmware downgrade method it says 1.0.47 is the one that's vulnerable. Is this a documentation error?
Also, given my device info (RD03, 1.0.47), what are my options to install OpenWRT if my device has Winbond chips, and what would differ it is ESMT?
It is definitely AX3000T, sticker at the bottom of the router says that too, and the same label has RD03 mentioned on it - also the Web UI is in chinese language. And I looked through the holes at the bottom, and can see "ESMT" written on the small black chip. So decided to go with the stable release (fingers crossed).
I didn't check with -i esmt, but I just successfully flashed the latest release of OpenWRT, without any issues - so it must be ESMT (as I saw through the bottom of the router)
Build your own firmware images with the packages you need integrated. Using opkg to update things is more or less not recommended. https://firmware-selector.openwrt.org/
The Wiki doesn't say "not vulnerable". It states: "this method is not supported". This is because commands to exploit the the start_binding, used for both rd03 and rd23, are not supported by rd03 ver. 1.0.47:
For the rd03 1.0.47, there is a separate section in Wiki ("Firmware downgrade method") with another commands to exploit the arn_switch.
Does it make sense? Do you see how Wiki can be updated to be more clear about this, please?
The wiki entry is very poorly worded about this, neither of these are SSH exploits, they are exploits targeting two different APIs that are not related to SSH. Once exploited, RCE is used to start dropbear.
Could you please update this in the Wiki to be more clear, and to prevent confusion for others? (If you don't have access, please share your suggested text here, and someone who has access will assist in moving it to the Wiki.).