Home > Default > Unhash RV220W password for built-in cisco credential

Unhash RV220W password for built-in cisco credential

October 11Hits:0
Advertisement
hmm.. odd.
we have 4 RV220W routers installed in a mesh and all seem to be working fine.
oddly, one is configured just a bit differently.  instead of access via the 'cisco' credential, we have been using an added 'admin' credential.
no real issue so far except that now we find that SNMPv3 is not working for it on this RV220W router.
I'd like to re-set the default built-in 'cisco' credential but only know the 'admin' credential password.
Since we have the configuration file we should be able to un-hash the 'cisco' password and set it to something new, right?
Any clues on how simply un-hash that password (besides totally re-setting the router)?
ADVthanksANCE,
michael grimes
Firmware Version
1.0.4.17
Serial Number
SER164602CM
Users
1/3
cisco
SSLVPN
Administrator
Local User Database
Disconnected
guest
SSLVPN
Guest
Local User Database
Disconnected
admin
SSLVPN
Administrator
Local User Database
Connected
SSLVPNUser[1] = {}...
SSLVPNUser[1]["LoginFromBrowser"] = "0"
SSLVPNUser[1]["DenyLogin"] = "0"
SSLVPNUser[1]["DefaultUser"] = "1"
SSLVPNUser[1]["LastName"] = "ssl"
SSLVPNUser[1]["LoginFromIP"] = "0"
SSLVPNUser[1]["FirstName"] = "cisco"
SSLVPNUser[1]["UserType"] = "3"
SSLVPNUser[1]["Password"] = "10DB74166DC148DD8B8AA7E337D3D9B19F*"
SSLVPNUser[1]["UserName"] = "cisco"
SSLVPNUser[1]["GroupName"] = "SSLVPN"
SSLVPNUser[1]["UserTimeOut"] = "10"
SSLVPNUser[1]["_ROWID_"] = "1"
SSLVPNUser[1]["DenyLoginFromWan"] = "0"

Answers

hmm.. odd.
we have 4 RV220W routers installed in a mesh and all seem to be working fine.
oddly, one is configured just a bit differently.  instead of access via the 'cisco' credential, we have been using an added 'admin' credential.
no real issue so far except that now we find that SNMPv3 is not working for it on this RV220W router.
I'd like to re-set the default built-in 'cisco' credential but only know the 'admin' credential password.
Since we have the configuration file we should be able to un-hash the 'cisco' password and set it to something new, right?
Any clues on how simply un-hash that password (besides totally re-setting the router)?
ADVthanksANCE,
michael grimes
Firmware Version
1.0.4.17
Serial Number
SER164602CM
Users
1/3
cisco
SSLVPN
Administrator
Local User Database
Disconnected
guest
SSLVPN
Guest
Local User Database
Disconnected
admin
SSLVPN
Administrator
Local User Database
Connected
SSLVPNUser[1] = {}...
SSLVPNUser[1]["LoginFromBrowser"] = "0"
SSLVPNUser[1]["DenyLogin"] = "0"
SSLVPNUser[1]["DefaultUser"] = "1"
SSLVPNUser[1]["LastName"] = "ssl"
SSLVPNUser[1]["LoginFromIP"] = "0"
SSLVPNUser[1]["FirstName"] = "cisco"
SSLVPNUser[1]["UserType"] = "3"
SSLVPNUser[1]["Password"] = "10DB74166DC148DD8B8AA7E337D3D9B19F*"
SSLVPNUser[1]["UserName"] = "cisco"
SSLVPNUser[1]["GroupName"] = "SSLVPN"
SSLVPNUser[1]["UserTimeOut"] = "10"
SSLVPNUser[1]["_ROWID_"] = "1"
SSLVPNUser[1]["DenyLoginFromWan"] = "0"

Read other 15 answers

Tags:

Related Articles

Copyright (C) 2019 wisumpire.com, All Rights Reserved. webmaster#wisumpire.com 14 q. 1.244 s.