This post explains the procedure to disable TR069 on a Youhua PT926G fiber optic modem, to prevent China Telecom from pushing config/firmware updates, and void your change of switching to bridging mode or setting port-forward rules. In the WAN settings of the management portal of this modem, the TR069 connection can neither be modified nor removed. But with a simple patch on the management portal's code, you can break the limitation on the modem. First, you should follow my previous post: Hacking a Youhua PT926G Fiber Optic Modem , to obtain the Telnet Root password. Then Telnet in, run su , and type in the password to get to Root Shell. When you do that correctly, the command-line will prompt # . Then follow these steps: Type cp /home/httpd/web/net_eth_links.asp /var/ and hit Enter....
Hacking a Youhua PT926G Fiber Optic Modem
This post explains the procedure to obtain such privileges from a Youhua PT926G fiber optic modem, without disassembling the device or using serial port converters. Super Admin users on Web UI (telecomadmin) Telnet's root user access FTP access FYI I obtained the device from China Telecom, Guangdong Shenzhen. Log on as Super Admin If you directly access the modem's IP ( http://192.168.1,1 ), you will see such a login page to the modem: Here you can log in with account name useradmin and the password labeled on the back of the modem, but there's not much you can do once logged in. The only useful thing seems to be Wi-Fi setting. But a Nmap scan reveals much more: $ nmap -v 192.168.1....