The administrator password and broadband password are directly obtained from multiple vrouters of feixun.
FIR150M, FWR-701 and other types of device administrator password directly through simple encryption on the existence of JS. The administrator password is easy to obtain. The problem lies in http: // 192.168.1.1/js/forbidView. js.
Tried FIR150M and FWR-701 there is a few FWR-60, have fallen
Open the router login interface, open the artifact review element-sources open js and see forbidView. js? R = 14 .....
Indicates the encryption method directly.
It is estimated that all these models have fallen.
Log on directly after decryption
You can directly back up the configuration to do something shy, back up the dat format, and open the txt file directly. You can simply search for the broadband password and various information.
Solution:
Enhanced verification