Topic: Linksys locking down serial bootloader console to prevent hacking
I just bought a Linksys WRP400 Wireless G Router with 2 Phone Ports.
I've soldered a serial console on the device, but it looks like Linksys (well, CyberTan actually) have gone out of their way to lock out hackers from this device.
It runs u-boot as the bootloader, but prints "CONSOLE_STATE IS locked" on boot, and does not allow you to interrupt the boot with a keypress. It also looks like CyberTan are not directing kernel output to the serial port either.
Details are at http://wiki.openwrt.org/OpenWrtDocs/Hardware/Linksys/WRP400 and I will keep that page up to date with what I find out.
All in all, it's a pretty good defence (from Linksys's point of view) against the casual hacker ...
Anyone seen this before?