On latest firmwares ssh and telnet access is filtered to local user. You can try to scan open ports of your device, for example with nmap. If your device have SSH or Telnet ports open you can go directly to step 2.
You can restore initial firmware by making factory reset
hold down the reset button until the power light turns red1
If you unable to connect automatically, set ip of your computer to usable host IP Range 192.168.1.2 - 192.168.1.254 with subnet mask 255.255.255.0 and gateway 192.168.1.1
For example:
Adress: | 192.168.1.2 |
Netmask: | 255.255.255.0 |
Gateway: | 192.168.1.1 |
Using telnet client connect to 192.168.1.1 After successful connection login with admin and password 1234.
Executing in terminal:
cat /etc/passwd
we can get information for all user accounts on the system
Salt for the password is first 2 characters of the encrypted password.2
For example default login admin with password 1234 will be:
admin:mTzCzri5uT0V.:100:1:Administrator:/:/bin/sh
We can check that salt if first 2 characters by doing:
openssl passwd -crypt -salt mT 1234
and getting result:
mTzCzri5uT0V.
With this knowledge it is possible to decrypt password for supervisor account, but there is more easier way to do so:
Executing:
cat /var/csamu
We will get pair user : password where password is base64 encoded value.
Using any base64 decoder we can receive our password values.
Using supervisor account we can have full access to our web system.
-
In maintance -> TR-069 Disable inform Change connection request settings
-
In maintance -> Remote MGMT Check out all wan if present
-
Change supervisor password
-
???
1: http://lists.genieacs.com/pipermail/users/2015-July/000329.html
2: https://forum.kitz.co.uk/index.php/topic,13930.msg351769.html#msg351769