It is also possible to enable a CLI telnetd (not reachable by default) on port 23/tcp by using hardcoded credentials on the web admin interface ( Futhermore, due to the lack of firewall for IPv6 connectivity, all the internal services will be reachable over IPv6 (from the Internet).only HTTP/HTTPS is listening by default on the LAN.On the first analysis, attack surface is not huge: The fiberhome devices have quite a similar codebase, so it is likely all other fiberhome devices (AN5506-04-FA, AN5506-04-FAT, AN5506-04-F) are also vulnerable. Some vulnerabilities have been tested successfully against another fiberhome device (AN5506-04-FA, firmware RP2631, 4 April 2019). The vulnerabilities have been confirmed in the latest firmware image (RP2613). UPDATE the latest firmware version (RP2613) is also vulnerable. I validated the vulnerabilities against HG6245D, RP2602: Config# show version These devices come with competitive pricing but are very powerful, with a lot of memory and storage. They are mainly used in South America and The FiberHome HG6245D routers are GPON FTTH routers. FiberHome Technologies is a leading equipment vendor and global solution provider in the field of information technology and telecommunications.