At least 28 backdoors and many other vulnerabilities were discovered in the firmware of the popular FTTH ONT router, which is widely deployed throughout South America and Southeast Asia.
FTTH ONT stands for Fiber-to-the-Home (Fiber-to-the-Home Optical Network Terminal). These are special devices placed at the end of the fiber optic cables. Their role is to convert the optical signals sent through the optical fibers to standard Ethernet or WiFi connections.
FTTH ONTs are usually installed in apartment buildings or inside houses or businesses who choose gigabit subscriptions.
In a report published last week, security researcher Pierre Kim reported finding too many security gaps with FiberHome HG6245D and FiberHome RP2602, two models of FTTH ONT routers developed by Chinese company FiberHome Networks.
The report describes both the positive and the negative issues with both router models and their firmware.
On the plus side, both devices do not expose the control panel to an external IPv4 interface, making it impossible to attack the web panel over the Internet. Additionally, the Telnet management feature, which is often used to exploit botnets, is disabled by default.
However, Kim reports that FiberHome's engineers apparently failed to activate, as its firewall devices is only active on the IPv4 interface and not IPv6, allowing direct access to all the router's internal services, as long as one knows the IPv6 address.
Kim described a long list of backdoors and vulnerabilities he discovered in the device, which he claims could be used by intruders to take over ISP infrastructure.
See the list of vulnerabilities