#!/bin/sh export DATE="20.4.2010";SCRIPT=${0#/rom} export TITLE="Admin Login" . ${SCRIPT%/*}/cgi-bin-pre.sh cat<Admin Login EOF srcip_for_ip() { ip route get $1 | sed -n "s#.* src[ ]\{1,\}\([0-9\.]\{1,\}\).*#\1#p" } srcdev_for_ip() { ip route get $1 | sed -n "s#.* dev[ ]\{1,\}\([a-z0-9]\{1,\}\).*#\1#p" } SRCIP=$(srcip_for_ip $REMOTE_ADDR) SRCDEV=$(srcdev_for_ip $REMOTE_ADDR) REDIR_ACTION="location.href='cgi-bin/index.html';" . /etc/functions.sh get_netparam if [ "$SRCDEV" != "lo" ] && [ "$LANADR" != "$SRCIP" ]; then if kill -0 $(cat /var/run/secureadmin.pid 2>/dev/null) 2>/dev/null; then REDIR_ACTION="location.href='https://$SRCIP/cgi-bin/index.html';" elif [ "1" != "$(nvram get ff_unsecure_webadmin)" ];then REDIR_ACTION= fi fi cat< //

Using the administration pages via a wireless connection is disabled. This is because the necessary password will be transferred unencypted every time a new page is accessed. You have the following alternatives to access the admin pages now:

EOF . ${SCRIPT%/*}/cgi-bin-post.sh