firmware/src/packages/fff/fff-network/mips
Foliant 4b65cb8152 Portzuordnung und MAC auslesen
Die sehr seltsame Portzuordnung des TP-Link TD-W9980 (Baugleich auch TD-W9980 und TD-W8980)
Außerdem Pfad ROUTERMAC

Signed-off-by: Foliant <foliant@noreply.git.freifunk-franken.de>
2021-08-31 17:05:58 +02:00
..
network.glinet,gl-ar150 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.mode fff-network: Group network files by arch, not by target 2020-06-18 12:47:05 +02:00
network.tplink,archer-c7-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c7-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c25-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v1 fff-network: adapt support for TP-Link CPE210/510 v1 2021-07-09 10:04:12 +02:00
network.tplink,cpe210-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe510-v1 fff-network: adapt support for TP-Link CPE210/510 v1 2021-07-09 10:04:12 +02:00
network.tplink,tdw8980 Portzuordnung und MAC auslesen 2021-08-31 17:05:58 +02:00
network.tplink,tl-mr3020-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa850re-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa860re-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa901nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3500-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3600-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4300-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4310-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr710n-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr740n-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr741-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr741nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v7 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v8 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v9 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v10 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v11 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v12 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr842n-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043n-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,bullet-m-ar7240 ath79: implement both versions of ubnt,bullet-m 2021-06-08 20:15:30 +02:00
network.ubnt,bullet-m-ar7241 ath79: implement both versions of ubnt,bullet-m 2021-06-08 20:15:30 +02:00
network.ubnt,nanostation-loco-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-loco-m-xw treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,picostation-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifi treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifiac-mesh treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00