'Load ARM (MIPS-MIPS32) Linux filesystem on VMware? [closed]

I have a Linux firmware for the MIPS architecture. Would it be possible to load up a firmware image like this in VMWare? I am trying to get into reverse-engineering, but have hit a wall. Here is the binwalk output:

8212          0x2014          uImage header, header size: 64 bytes, header CRC: 0xD384760C, created: 2021-12-01 11:10:32, image size: 1975811 bytes, Data Address: 0x81001000, Entry Point: 0x813E4860, data CRC: 0xE74BA6F, OS: Linux, CPU: MIPS, image type: OS Kernel Image, compression type: lzma, image name: "Linux Kernel Image"
8276          0x2054          LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 5748736 bytes
1984088       0x1E4658        Squashfs filesystem, little endian, version 4.0, compression:xz, size: 10883970 bytes, 2239 inodes, blocksize: 131072 bytes, created: 2021-12-02 11:17:54

I have managed to extract the raw filesystem from the .bin file, but cannot get much further. How would I go about loading something like this in VMware? Would it even be possible due to architecture differences? It has a squashfs-root file, and some others in the binary. I am myself on windows (doing everything via WSL), but not shy to boot Linux. Here is some LS output of the binary: enter image description here

I am able to extract the files with 7zip from the binary, as stated. But this removes the other 1E4658.squashfs file, the 2054 file, and the 2054.7z and only decompresses the linux filesystem from squashfs-root.

The 1E4658.squashfs file, is a copy of the whole filesystem it seems like. (I think maybe for validation? I don't know.)

It's firmware for my TP-link deco. If anyone has any tips to get further with reverse engineering, please do share!! :)



Sources

This article follows the attribution requirements of Stack Overflow and is licensed under CC BY-SA 3.0.

Source: Stack Overflow

Solution Source