In this GitHub repository, someone used a loader patch to bypass the system verification. You can download its NPK file and unpack it to see the bypass method. Theoretically, it could be applied to crack x86, CHR, ARM64, and various other platforms. I think RouterOS’s signature verification needs to be strengthened, and I hope it will be improved in the official release of version 7.20!
I remind everyone that without full administrative access, no matter what happens, nothing can be done.
essentially (with admin access) this is a keygen to crack any arm or chr/x86 instance to "P unlimited" or "P10" license level?
or did i misread something?
(at least as one is willing to upload a "not so trustworthy npk" to a MT instance...)
Actually, apart from what’s inside the NPK, the loader (which seems to be located under nova/bin), everything else from the author should be open source.
I just would like to add one thing: NIS2 ZTA
I hope MikroTik will strengthen RouterOS soon.
I see your NIS2 ZTA and add (Collins Aerospace) ARINC (c/v)MUSE.
And throw on the table also CUPPS and CUTE.