Hi
HowlingWolf,
Hi Asbokid,
I haven't got that far yet 
I'm in the 'final stretch' of another project which I'm hoping to wrap up within the next couple of days. I'm just taking a break before I start on the final code sections.
Surely that can wait?! Priorities and all that!
One thought does occur. There appears to be two sections. A binary 'header' block and what looks like an old-fashioned uuencoded data block.
It's definitely a binary-to-text encoding. But I fear it is encrypted, too. Likely those first 128 bytes contain some sort of cryptographic key.
A Unix tool called
uudeview was used to try and identify the encoding. The tool can reportedly handle "uuencoding, xxencoding, Base64 and BinHex encoding methods". [1] But alas it still couldn't identify the encoding scheme to the
defaultcfg.xml file in the HH3.0b firmware.

Though there are a couple of HTML files to be found in the bootloader section of the HH3.0b firmware image. This HTML reveals that the bootloader has the same facility as the HG612 for flashing in new firmware:
$ dd if=./hh3.0b_V100R001C01B031SP09_l_B_t2011-06-01_22_39.rawnanddumpeccstripped.bin of=upload.html bs=1 count=$((0x5fa)) skip=$((0x35504))
1530+0 records in
1530+0 records out
1530 bytes (1.5 kB) copied
And that file
upload.html contains this:

In the same area of the NAND dump (0x35504 onwards) is another HTML file relating to f/w uploading - mainly to do with failed flashes, etc..
Perhaps someone with a working HH3.0b would check something. (it won't do any harm). By holding in the reset button of the HH3.0b while powering up the device (and keeping it pressed for 10 seconds), that should bring up a web interface on 192.168.1.1.
Once the firmware format is understood, in theory, that web interface would allow the HH3.0b to be reflashed with modified (unlocked) firmware 8)
cheers, a
[1]
http://www.fpx.de/fp/Software/UUDeview/Manual-Unix-uudeview.html