You did a spectacular job discovering the real hardware behind the Riger DB120-WL Silver Coloured Lunchbox modem.
It's quite a good hardware actually which TM probably made it right out of so many hardware releases if people actually know how to tune(configure) it properly.
I might want to cross flash it to the official TP-Link firmware in future after the warranty has expired.
Meanwhile I only have 1 modem without a spare, so need to take care not to mess much with it yet.
My solution is rather simple approach to patch and remove all the backdoors contained in TM's cutomized firmware.
Here's what I did:
1) Disable Wireless Radio Fully In The Modem (Uncheck the Function)
This turns the modem into a 4 port switch Wired-Only Router Modem.
DHCP Server/Assignment for the TM modem is still left intact so I got myself those cheap TP-Link wireless router in the market disabled DHCP function in them so use them as strategic APs in my house. Anything with Wireless-G/150N is good enough.
With my Wireless APs, plugged into the ports 1-4(either one) of the TM DB120-WL 4 port switch modem, I can turn them off/on as I like with each having secure WPA2-AES access. Mostly I'm on wired, so they are turned ON when I have guest/need access for my mobile devices.
2) Under Access Management Tab
i) Under ACL, Delete Interface 3 For WAN Remote Access, but keep
Interface 2 for WAN Ping (Just Disable It For Future Uses)
Then Deactivate ACL totally with the main radio button above.
ii) TR-069
Deactivate It.
I can only think of those being security weakneses of the modem.
The other stuffs like changing the default access password, MAC filtering, and using stronger wireless encryptions are normal routines to protect your hardware from remote access.
May 16 2014, 05:09 PM
Quote
0.0239sec
0.39
7 queries
GZIP Disabled