Breaking code protection is difficult, expensive and resource consuming. In general you can't pull out the data from protected chip using a normal programmer. Most approach is to decap the chip without damaging it and then probe it (i suppose a ghetto setup could be made for a few thousand $).
In case there is a bootloader of some sort or other application with which you can communicate, you MAY be able to find some exploit, that gives you code execution, then load instructions to dump program memory byte by byte. With bootloader you can sometimes use some sort of borderline condition attack like power or reset line glitching. I may get you somewhere, it may not.
If it's aoyue you better buy new station or just frite FW yourself (it's gonna be better than the one in original station anyway)