Skip to content

Commit c32fb3b

Browse files
committed
Add bDcom@123 backdoor password for ONU1710-1G
1 parent 868142a commit c32fb3b

1 file changed

Lines changed: 3 additions & 0 deletions

File tree

_ont/ont-fs-com-onu1710-1g.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,8 @@ Only the `user` account is publicly documented by FS.com. The `admin` account wa
4949
| -------- | ------------- | ---------- | ------------------------------------------------------ |
5050
| `user` | `123456` | Web/Telnet | Limited user account (publicly documented) |
5151
| `admin` | `super&123` | Web/Telnet | Super user / administrator |
52+
| `admin` | `bDcom@123` | Web | Hardcoded backdoor password; cannot be changed |
53+
| (any) | `bDcom@123` | Telnet | Hardcoded backdoor password; telnet accepts this password for any username, including nonexistent ones; cannot be changed |
5254

5355
## Hardware
5456

@@ -254,6 +256,7 @@ flash set SUSER_PASSWORD newpassword
254256
{% include alert.html content="This device has extremely poor security practices and should not be used in any environment where it may be reachable by untrusted parties." alert="Warning" icon="svg-warning" color="red" %}
255257

256258
- **Undocumented default credentials**: The `admin` account (`super&123`) is not mentioned in any FS.com documentation but has full administrative access. The firmware also contains references to additional accounts (`adsl`/`xponadmin`, `xponadmin`/`xponre@1t3k`) in inactive backup config files and hardcoded code paths. These were not usable but are likely leftovers from the Realtek SDK.
259+
- **Hardcoded backdoor password**: The password `bDcom@123` is hardcoded in the firmware and cannot be changed. It grants access as `admin` to the web interface. On telnet it is accepted for **any** supplied username, including nonexistent ones, and results in a `root` shell.
257260
- **Unencrypted management protocols**: Both the web interface (HTTP port 80) and Telnet (port 23) transmit credentials and configuration in cleartext. Both are enabled by default.
258261
- **Arbitrary script upload and execution**: The `vermod.asp` page has an "Import" form that posts to `/boaform/formImportOMCIShell`. The handler writes the uploaded file to `/tmp/omcishell` and executes it immediately via `system("/bin/sh /tmp/omcishell")`. Likely an intentional debug feature that allows the `admin` user to execute commands as root without going through telnet.
259262
- **Privilege escalation via auth realm mismatch**: The Boa web server maps `/` to admin credentials and `/boaform/admin` to user credentials. Admin-only handlers like `formImportOMCIShell` can be reached by the low-privilege `user` account by requesting `/boaform/admin/formImportOMCIShell` instead. This gives the unprivileged account full root access.

0 commit comments

Comments
 (0)