This post has been in the making for over 4 months, and it’s finally able to see the light of day. The vulnerability I found has finally been disclosed and posted over at http://seclists.org/fulldisclosure/2010/Dec/213 it details the vulnerability and some of it’s uses. I was hoping to have the custom firmware finished by then with this patched, but at this time it’s still a ways away.
Before the iSpot required you to upload a firmware or config file to the device in order to remove the restrictions. However, now all you need to do is point your browser to a specific URL and it does all the work for you. The only 2 things you need to do is one, make sure you are currently connected to your iSpot with a valid service plan. And second, ensure that it has the default IP as 192.168.1.1. The best part about this new way to remove the restriction is that it works on ALL current iSpot firmwares.
If you don’t know how to check that the IP is 192.168.1.1, then you most likely already have it at 192.168.1.1. But if not, it’s just easier to do a Factory Reset (hold the power button for over 30 seconds, and let go). Once you meet those 2 requirements, head on over to http://ispotunrestricted.com/2.0/. Once there, you just need to wait until the device restarts and it should be all ready to go.
If you have problems and you meet the 2 above requirements, the other page will have a few more steps you can do if you’re having issues. Happy unrestricting!