At first you do need a firmware exploit. That's not easy because the firmware seems to be encrypted and packed (or the other way around).
The 'easiest way' would be to read to get access to the device and read out the 'unencrypted firmware' (if available).
Let's say you get access to the device. Then you need an adjusted Linux. The kernel will be not a problem but custom hardware will be.
At least on the shortrun there is nothing you can do.
|