syntax / usage SetSSID, SetSecurityKeys
See original GitHub issuesorry i didnt know where to ask
so enabling WLAN like that works for me:
fc.call_action('WLANConfiguration3', 'SetEnable', NewEnable=True)
i wanted to set the SSID / Key, but im still not lucky
fc.call_action('WLANConfiguration3', 'SetSSID', NewSSID='guest-net')
current error say 402 / Argument error
same goes for setting the keys
fc.call_action('WLANConfiguration3', 'SetSecurityKeys', NewPreSharedKey='St4Rk3SP422w0rD')
i got the SSID set with ‘SetEnable’ instead of SetSSID
fc.call_action('WLANConfiguration3', 'SetEnable', NewSSID='guest-net')
which confuses me even more
so i tried this
arguments={'SetSSID': {'NewSSID': 'guest-net'}}
fc.call_action("WLANConfiguration3", 'SetEnable', arguments=arguments)
i got no error like befor, but nothing was changed
pls help
Issue Analytics
- State:
- Created 3 years ago
- Comments:8 (3 by maintainers)
Top Results From Across the Web
setsid command in Linux with Examples - GeeksforGeeks
setsid command in Linux system is used to run a program in a new session. ... Syntax: setsid [options] program [arguments].
Read more >- setsid()
The setsid() function creates a new session with the calling process becoming the process group leader with no controlling terminal.
Read more >gpg - Unix, Linux Command - Tutorialspoint
This command can be used to force a trust database check at any time. The processing is identical to that of --update-trustdb but...
Read more >Toybox 0.8.8 command help
Use ctrl-alt-F1 to switch from X11 to a virtual terminal, and alt-F6 (or F7, or F8) to get back. cksum. usage: cksum [-IPLN]...
Read more >Running Commands on a Remote Linux / UNIX Host - nixCraft
Explains how to execute or run a commands on a remote Linux or Unix host server using the ssh command and get output...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I did some more trials and found a quick and dirty hack which actually works. I am aware that this is far from being good code, however I would say this is a confirmation that AVM’s statement is true: In this case the ‘
s:
’ is malicious. I did as follows:In
soaper.py
I added below line 226 (this is in the methodexecute()
, the following code snippet:This removes the ‘
s:
’ from that very body in that very case. This works fine, the password gets changed.So my script looks like as follows:
The following output is generated:
So to me it looks like AVM support is right and the ‘
s:
’ should not be there.Hello everybody, I also tried to fix the problem for the last two days. I came across this post today. Thanks to @solderdot72, I would have been about to bother with wireshark. This workaround helps me first.