Share this

Decryption method for Mitsubishi FX series PLC

2026-04-06 07:05:36 · · #1

01. Use a serial port debugger and set the relevant parameters.

02. Determine the Mitsubishi PLC model, and select the corresponding string in the serial port debugger according to the PLC model.

Appendix:

PLC model corresponding string

FX2\STX0700808\ETX6A

FX2N\STX0300808\ETX66

FX2_EPROM\STX0800808\ETX6B

FXON/FXOX\STX0800808\ETX6B

FX1N/FX1X\STX0800808\ETX6B

03. After sending, a string of characters will be displayed in the receiving box. If you are smart, you will definitely discover the mystery of these characters.

(That is, the returned password)

If you still can't figure it out, copy these strings into a HEX file and send it. (Remember to disconnect the PLC before sending.)

I suggest you set your own password, then use this method to read it once to see what's going on. After that, you'll know what's going on.

Password characters: 0-9, AF.

04. Examples illustrating the cracking of passwords for A and FX series PLCs:

Series A:

Send: A20700FF0205AE0008C3

Received: 0B00FF0200AA7755BBEFCDABA400

Password: ABCDEF

Send: A20700FF0205AE0008C3

Received: 0B00FF0200AA7755BBC1B1A1A4

Password: A1B1C1

Analysis: The password consists of the characters from BB to A4 in the returned characters, read from right to left in units of 2 characters each.

FX series:

Set the serial port to COM1, baud rate to 9600, data bits to 7, parity to E (even), and stop bits to 1.

Input: EHX, Display: ASC

send:

0230383030383038033642

Returns a string of hexadecimal ASCII codes, where 30 is the number 0, 31 is the number 1, 01 is A, 02 is B, and so on;

Example: 0230383030383038033642

\STX4236353433323130\ETX41

The password is: B6543210 (42=B)

Read next

CATDOLL 136CM Tami (TPE Body with Hard Silicone Head)

Height: 136cm Weight: 23.3kg Shoulder Width: 31cm Bust/Waist/Hip: 60/54/68cm Oral Depth: 3-5cm Vaginal Depth: 3-15cm An...

Articles 2026-02-22