PLDT Home Fiber router hacking |
Version | v0.1 | |
---|---|---|---|
Updated | |||
Author | kleo | License | MIT |
A walkthrough on my current progress on hacking the PLDT FIBR AN5506-04-FA router RP2616.
After a long wait for the ISP to install our new fiber internet connection, finally I can enjoy that 50 Mbps speed at home. The technicians finished setting up the fiber connection, router and phone. They head on home.
Accessed the web interface on my computer at 192.168.1.1 with the default username admin and password 1234. Initial setup was a breeze, asking for a new admin password, WiFi password for 2.4GHz and 5GHz.
While all is well first thing I noticed is the very limited settings on its web interface, bummer.
So to try a few things, I booted up Kali Linux and went on to use dirb
, a web content scanner. Basically it looks for existing (and/or hidden) Web Objects.
Now looking at the urls, they end with .asp, let's try adding an option to dirb to end with .asp file extension.
While I found just a couple of additional hidden urls, these won't be enough.
Luckily I found a similar router page for the AN5506-04-FA router. You can find the page at Hackcorrelation. Mirrors 1 2
The article provided me file urls such as http://192.168.1.1/menu/sfu/ph_pldt/hisi5116/voip_dualwifi/sip/1.xml
which contained more hidden urls on the router.
Now I can do so much more, like port forwarding and increasing WiFi power to 200%!
I listed all the hidden urls and files at https://github.com/bkspc/fiberhomesuperadmin/