Assuming one has a Huawei HG612 available (a HG612 that has been unlocked by flashing it with the relevant firmware image [1]) then it is possible to access the device via the LAN2 port, either by
ssh or by
telnet. From the initial
ATP> prompt one can then invoke a
Busybox shell.
The command that is of most use, upon which all the monitoring software depends, is the Broadcom
xdslcmd utility which interfaces with the Broadcom proprietary driver. The
xdslcmd command, when asked, will display its mode of usage --
# xdslcmd --help
Usage: xdslcmd start [--up] [--mod <a|d|l|t|2|p|e|m|v>] [--lpair <(i)nner|(o)uter>]
[--trellis <on|off>] [--snr <snrQ4>] [--bitswap <on|off>] [--sesdrop <on|off>]
[--sra <on|off>] [--CoMinMgn <on|off>] [--i24k <on|off>] [--phyReXmt <0xBitMap-UsDs>]
[--TpsTc <0xBitMap-AvPvAaPa>] [--monitorTone <on|off>]
[--profile <0x00 - 0xFF>|<"8a |8b |8c |8d |12a |12b |17a">] [--us0 <on|off>]
[--dynamicD <on|off>] [--dynamicF <on|off>] [--SOS <on|off>]
[--forceJ43 <on|off>] [--toggleJ43B43 <on|off>]
xdslcmd stop
xdslcmd connection [--up] [--down] [--loopback] [--reverb]
[--medley] [--noretrain] [--L3] [--diagmode] [--L0]
[--tones] [--normal] [--freezeReverb] [--freezeMedley]
xdslcmd configure [--mod <a|d|l|t|2|p|e|m|v>] [--lpair <(i)nner|(o)uter>]
[--trellis <on|off>] [--snr <snrQ4>] [--bitswap <on|off>] [--sesdrop <on|off>]
[--sra <on|off>] [--CoMinMgn <on|off>] [--i24k <on|off>] [--phyReXmt <0xBitMap-UsDs>]
[--TpsTc <0xBitMap-AvPvAaPa>] [--monitorTone <on|off>]
[--profile <0x00 - 0xFF>|<"8a |8b |8c |8d |12a |12b |17a">] [--us0 <on|off>]
[--dynamicD <on|off>] [--dynamicF <on|off>] [--SOS <on|off>]
[--forceJ43 <on|off>] [--toggleJ43B43 <on|off>]
xdslcmd bert [--start <#seconds>] [--stop] [--show]
xdslcmd afelb [--time <sec>] [--tones] [--signal <1/2/8>]
xdslcmd qlnmntr [--time <sec>] [--freq <msec>]
xdslcmd inm [--start <BB_THRESH 10*dB> <INMIATO> <INMIATS>] [--stop] [--show]
xdslcmd snrclamp [--shape <shapeId>] [--bpshape [bpIndex-bpLevel,]]
xdslcmd diag [--logstart <nBytes>] [--logpause] [--logstop] [--loguntilbufferfull <nBytes>]
[--loguntilretrain <nBytes>]
xdslcmd info [--state] [--show] [--stats] [--SNR] [--QLN] [--Hlog] [--Hlin] [--HlinS] [--Bits]
[--pbParams] [--linediag] [--linediag1] [--reset] [--vendor] [--cfg]
xdslcmd profile [--show] [--save] [--restore]
xdslcmd --version
xdslcmd --help
#
That looks to be a full and complete description of the
xdslcmd utility's usage. Or is it?

Quite recently it has been shown that the
info sub-command of the
xdslcmd utility can take a
vectoring flag and then display vectoring information relating to a VDSL2 circuit. [2][3]
For example --
# xdslcmd info --vectoring
xdslcmd: ADSL driver and PHY status
Status: Showtime
Retrain Reason: 0
Last initialization procedure status: 0
Max: Upstream rate = 4847 Kbps, Downstream rate = 21648 Kbps
Bearer: 0, Upstream rate = 4789 Kbps, Downstream rate = 22059 Kbps
Bearer: 1, Upstream rate = 0 Kbps, Downstream rate = 0 Kbps
Vectoring state: 5
VCE MAC Address: 0:0:0:0:0:0
Total error samples Ethernet pkts sent: 0
Total error samples Ethernet pkts discarded: 0
Total error samples statuses sent: 0
Total error samples statuses discarded: 0
#
Very recently, a discussion took place between the occupants of the
Eagle's Nest and
The Cattery when it was agreed that attempts should be made to discover any other latent flags of the
xdslcmd utility's sub-commands.
A quick look was taken at byte level of the contents of the most recent firmware image and only the following (partial) strings were seen --
Broadcom Corporatio
ver. 2.0
6368
96368MVWG
3551453
3217096960
2756608
3219853568
794845
EchoLife_
V100R001C01B030SP08-1407000358
qshs
This forum has many members with a wide range of abilities . . . I wonder if someone would be willing to dismantle the latest firmware image and then look into the binary files that are the Broadcom xDSL driver & the
xdslcmd utility, please?
Knowing the help output that is displayed by the utility may then give clues as to which part of the binary file that should be given close scrutiny. Who knows what might be discovered?
[1] Acknowledging the work of
Asbokid in developing the procedure & creating the initial unlocked firmware image and
Wolfy's later work in creating the more recent unlocked firmware images.
[2]
http://forum.kitz.co.uk/index.php/topic,14361.msg315738.html#msg315738[3]
http://forum.kitz.co.uk/index.php/topic,15593.msg315751.html#msg315751