Category:ZyXEL VMG3925 B10B: Difference between revisions
Appearance
Content deleted Content added
m Can't count: 8 not 9 |
mNo edit summary |
||
| (2 intermediate revisions by one other user not shown) | |||
| Line 37: | Line 37: | ||
*an Ethernet (PPPoE) router plugged in to a separate VDSL or ADSL modem or a FTTP or FTTPoD ONT |
*an Ethernet (PPPoE) router plugged in to a separate VDSL or ADSL modem or a FTTP or FTTPoD ONT |
||
*a bridging modem to a third-party PPPoE router (e.g. FireBrick, Mikrotik etc) |
*a bridging modem to a third-party PPPoE router (e.g. FireBrick, Mikrotik etc) |
||
=== Security Advisories === |
|||
ZyXEL have a page with their Security Advisories: https://www.zyxel.com/support/security_advisories.shtml |
|||
==='Consumer' grade=== |
==='Consumer' grade=== |
||
| Line 58: | Line 62: | ||
Supervisor password: |
Supervisor password: |
||
The B10B has an autogenerated supervisor password (hashed from the serial number). Earlier models left a md5crypt type hash in /etc/passwd, however firmware AAVF.10 changed to a SHA-512 type hash stored in /etc/shadow. |
The B10B has an autogenerated supervisor password (hashed from the serial number). Earlier models left a md5crypt type hash in /etc/passwd, however firmware AAVF.10 changed to a SHA-512 type hash stored in /etc/shadow. Prior to firmware AAVF.10 you will be able to read /etc/passwd by logging into the router as the "admin" user via SSH or Telnet. With firmware AAVF.10 and later you would have to log in as the supervisor user - but you'd need to know the password.... You would need to crack the hash (e.g. with hashcat), the password will be 8 characters long using characters 0-9,a-f (lower case) |
||
[[Category:AA Routers]] |
[[Category:AA Routers]] |
||