Thanks @emre!
"nvram set ath0_wpa_psk="your_key_without_quotes"" for WPA personal or "nvram set ath0_key1="as_above"" for WEP - not sure about the other encryption methods though. Check "nvram show | grep ath" for more options!
I managed to find the following for my router (using WPA2 - AES). Assuming 2.4 radio and 5.0 radio both have main password “12345”, and 2.4 Guest Network 1 has password “guestpassword”, here is what I’m seeing:
wl_wpa_psk=12345 (??? overall 2.4/5.0 main network)
wl0_wpa_psk=12345 (2.4 main network)
wl0.1_wpa_psk=guestpassword (2.4 guest network 1)
wl0.2_wpa_psk= (2.4 guest network 2)
wl0.3_wpa_psk= (2.4 guest network 3)
wl1_wpa_psk=12345 (5.0 main network)
wl1.1_wpa_psk= (5.0 guest network 1)
wl1.2_wpa_psk= (5.0 guest network 2)
wl1.3_wpa_psk= (5.0 guest network 3)
wlc_wpa_psk= (???)
I have question marks beside 2 of them, since I’m not sure what they’re for, but I’m interested in the Guest network anyway (wl0.1_wpa_psk
).
So assuming I want to run this command,
nvram set wl0.1_wpa_psk=newguestpassword
What would the rest of the script look like to login, and pass {:WiFiPW}
to the script to set the password, and logout, using Start Process
with something like:
Start Process: PuTTY.exe
Arguments: <script> {:WiFiPW}
… or …
Start Process: PuTTY.exe <script>
Arguments: {:WiFiPW}
… or …
Start Process: <script>
(through PuTTY association with .sh)
Arguments: {:WiFiPW}