QUOTE(rizvanrp @ May 31 2010, 12:43 PM)
Resetting doesn't work, this exploit relies on the fact that this account uses the default user/pass combo. Resetting it just resets it back to the same user/pass, remote management will be disabled however. But there's really no point anyway, the SSH daemon is still accessible via LAN.. cant stop it at all from the GUI even with this second account.
At least if you reset the router, the remote management becomes disabled without you having to access the account to do it manually. Easier for basic users to do. Then the account becomes inaccessible from the outside world, right? Isn't the SSH damon also disabled by default? So without remote access to the account, you cannot enable ssh? Correct me if I am wrong please.
When you say "accessible via LAN" , are you referring to your own internal network, ie other users at home / office? Or are you referring to other Unifi users within the Unifi network?
If I understad correctly, TM should disable remote management by default. They just have to reset the router upon installation. If TM requires remote management to do troubleshooting or maintenance, when a user calls the helpline, they can be instructed on how to enable the remote management , do the necessary maintenance and then rest / disable it again.