by getting a root shell I found out that the wireless chip shows up as 2 soft aps according to iwconfig one called ra0 and one called apclint0. I also found out that the ethernet interface shows up as eth2
too bsd I can't get the exploit to work on client and too bad iwconfig returns an operation not premitted error when trying to modify the wireless settings via telnet. if it did we could have hotspot mode which would be trendnet's wisp mode with at the repeater function turned on.
I was able to turn router mode into an ap bridge mode by dropping the firewall, turning off dhcp server and moving ra0 into the same bridge as eth2.