Yondoo provided router, has "password" as admin pw, won't let us change it

Dave Taht dave.taht at gmail.com
Thu Feb 9 14:43:44 UTC 2023


I am also a big fan of installing cake (sqm-scripts) in front cable devices.

On Thu, Feb 9, 2023 at 5:59 AM Todd Stiers <todd.stiers at gmail.com> wrote:
>
> [OP here]
>
> Just some minor follow up:
>
>  - The tech was able to swap out their RG with the modem-only one that I had sent (after making a couple phone calls). It didn't seem like they could provision a user-supplied modem remotely for some reason, but it also sounded like maybe this wasn't something they normally do, if ever.
>
>  - The outgoing RG was an Evolution Digital EVO3000GW. The screenshots that dropped were meant to show me attempting an admin password change, and it not letting me.
>
>  - AFAIK, no WAN ports were open, but UPnP was on by default. I neglected to do a port scan on the WAN port before the equipment swap, but that probably would've been prudent.
>
>  - Sorry for not being clear about this before, but I'm fairly remote (~5 hour drive), so my mom was acting as remote [somewhat arthritic] hands in all this.
>
>  - Since I'm remote, I had previously sent a raspberry pi that is running both pi-hole (to mitigate the possibility of her or her partner clicking on a malicious ad or pop-up that may compel them to inadvertently connect with a call center scammer again) and ZeroTier. I use ZT to log in to this device, which double NAT breaks, which is why I brought that up. Totally understandable that most average customers don't use this, and a double-NAT situation is probably fine for my mom's demographic. That said, to be sure, the much bigger issue is that they're provisioning CPE with an unchangeable "password."
>
>  - I understand that this forum may not be quite the right fit for a post like this, and am looking for others that may be more appropriate. My hope is that this eventually gets to someone at Yondoo, or parent Mid-Atlantic Broadband (AS29914), since something like this probably falls outside of the wheelhouse of their tier 1 support, which was all we could get a hold of.
>
> Thanks to everyone who's responded -- I value all of your input.
>
> Cheers,
> Todd
>
> On Wed, Feb 8, 2023 at 5:09 PM Jason R. Rokeach via NANOG <nanog at nanog.org> wrote:
>>
>> It’s been a while, but attacks that take advantage of this are (or at least in the past have been) real.
>>
>> https://blog.sucuri.net/2014/09/website-security-compromised-website-used-to-hack-home-routers.html
>>
>> https://www.digitaltrends.com/web/javascript-malware-mobile/
>>
>> I recall when this stuff first started to come out, leaning on RG vendors to fix their firmware to make their default passwords unpredictable based on information readily available on the LAN.
>> In this case we’re not even talking about taking action this sophisticated… It seems to me that, having a customer willing and ready to secure themselves, preventing them from doing so is wildly inappropriate.
>>
>>
>> On Wed, Feb 8, 2023 at 7:57 PM, Eric Kuhnke <eric.kuhnke at gmail.com> wrote:
>>
>> I agree, but if we start listing every massive security vulnerability that can be found on the intra-home LAN in consumer-grade routers and home electronics equipment, or things that people operate in their homes with the factory-default passwords, we'd be here all month in a thread with 300 emails.
>>
>> I'm sure this ISP will realize what a silly thing they did if and when some sort of worm or trojan tries a set of default logins/passwords on whatever is the default gateway of the infected PC, and does something like rewrite the IPs entered for DNS servers to send peoples' web browsing to advertising for porn/casinos/scams, male anatomy enlargement services or something.
>>
>>
>>
>> On Wed, Feb 8, 2023 at 3:28 PM William Herrin <bill at herrin.us> wrote:
>>>
>>> On Wed, Feb 8, 2023 at 2:36 PM Eric Kuhnke <eric.kuhnke at gmail.com> wrote:
>>> > I would hope that this router's admin "password" interface is only accessible from the LAN side.
>>> > This is bad, yes, but not utterly catastrophic.
>>>
>>> It means that any compromised device on the LAN can access the router
>>> with whatever permissions the password grants. While there are
>>> certainly worse security vulnerabilities, I'm reluctant to describe
>>> this one as less than catastrophic. Where there's one grossly ignorant
>>> security vulnerability there are usually hundreds.
>>>
>>> Regards,
>>> Bill Herrin
>>>
>>>
>>> --
>>> For hire. https://bill.herrin.us/resume/



-- 
This song goes out to all the folk that thought Stadia would work:
https://www.linkedin.com/posts/dtaht_the-mushroom-song-activity-6981366665607352320-FXtz
Dave Täht CEO, TekLibre, LLC


More information about the NANOG mailing list