Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed

Outline · [ Standard ] · Linear+

Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside

views
     
MX510
post May 29 2010, 07:31 AM

Love Me Sin Hate Me Sinner
*******
Senior Member
4,038 posts

Joined: Aug 2005
From: Earth



Flash to dd-wrt n disable the remote management
MX510
post Jun 1 2010, 09:07 AM

Love Me Sin Hate Me Sinner
*******
Senior Member
4,038 posts

Joined: Aug 2005
From: Earth



TM also did this on their GITN Customers
MX510
post Jun 2 2010, 08:05 PM

Love Me Sin Hate Me Sinner
*******
Senior Member
4,038 posts

Joined: Aug 2005
From: Earth



Actually they also did this on their corporate customer it just ur router username n password tongue.gif . Nobody can install anything into it tongue.gif . Even default username n password for Streamyx are also unsecured if u set the modem dial and store ur password in there tongue.gif
MX510
post Jun 2 2010, 08:21 PM

Love Me Sin Hate Me Sinner
*******
Senior Member
4,038 posts

Joined: Aug 2005
From: Earth



QUOTE(rizvanrp @ Jun 2 2010, 08:10 PM)
MX there's a difference between their Riger DSL modem which is pretty crappy and only has a web UI compared to a custom made DLINK DIR-615 with full SSH access.. full SSH access you can SSH tunnel.. you can view the conntrack table.. you can modify the iptables and DNS servers to redirect users to phishing sites..
*
I don't see much exploit can be install inside the router itself. Only as u said it they can view connections and ip tables and dns servers :-) . Anyway it's good that u point up the issues as i already notice it that they did it as practice common among their users since years ago and apply it for Unify.

As i also in my case did change the username n password default for my router in my office that use GITN line hehe they give a call and ask me why did i change it tongue.gif because they want to monitor tongue.gif.

CODE
TM would like to assure all concerned parties that the only reason the UniFi router setting for remote access is enabled is for remote access troubleshooting purposes for the express use of our technical support personnel. In the event there is a technical support issue with any of our UniFi subscribers; at the first level of troubleshooting, TM’s network operation centre (NOC) can immediately remotely diagnose the problem before sending a support team on-site.


Anyway u just give UniFi teams more work to do and setup their own database for unique password for each customers. As the issues already when public into www.thestar.com.my

CODE
TM also acknowledges that there is a need to balance the public’s level of comfort with regards to security and privacy and TM’s own commitment to faster support turnaround time. As such, TM would like to maintain the higher level of service enabled by remote access management on customer routers, and in recognition of that TM will immediately  change  every UniFi customers’ router management password into a high security, unique one (which will be only known to the customer and TM). TM will notify all our Unifi customers of this change accordingly.


Hehehe just for those who set username n password for ppoe into ur ADSL modem also pls change the default password because ppl can scan ip and get into ur ADSL modem and get ur username n password.



Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.0162sec    0.38    7 queries    GZIP Disabled
Time is now: 2nd December 2025 - 04:17 AM