{"id":36037,"date":"2020-07-10T11:30:00","date_gmt":"2020-07-10T11:30:00","guid":{"rendered":"http:\/\/3ddc266a-9efe-442c-a49e-a5a5f44f8e67"},"modified":"2020-07-10T11:30:00","modified_gmt":"2020-07-10T11:30:00","slug":"backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/","title":{"rendered":"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/07\/10\/4ee8d258-2e31-4342-a154-bbaca330f965\/cdata.png\" class alt=\"CDATA\"><\/span><figcaption><span class=\"caption\"><\/span><\/figcaption><\/figure>\n<p>Two security researchers said this week that they found severe vulnerabilities and what appears to be intentional backdoors in the firmware of 29 FTTH OLT devices from popular vendor <a href=\"https:\/\/cdatatec.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">C-Data<\/a>.<\/p>\n<p>FTTH stands for Fiber-To-The-Home, while OLT stands for Optical Line Termination.<\/p>\n<p>The term FTTH OLT refers to networking equipment that allows internet service providers to bring fiber optics cables as close to the end-users as possible.<\/p>\n<p>As their name hints, these devices are the termination on a fiber optics network, converting data from an optical line into a classic Ethernet cable connection that&#8217;s then plugged in a consumer&#8217;s home, data centers, or business centers.<\/p>\n<p>These devices are located all over an ISP&#8217;s network, and due to their crucial role, they are also one of today&#8217;s most widespread types of networking devices, as they need to sit in millions of network termination endpoints all over the globe.<\/p>\n<h3>Seven very severe vulnerabilities<\/h3>\n<p>In a <a href=\"https:\/\/pierrekim.github.io\/blog\/2020-07-07-cdata-olt-0day-vulnerabilities.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">report published this week<\/a>, security researchers Pierre Kim and Alexandre Torres said they discovered seven vulnerabilities in the firmware of FTTH OLT devices manufactured by Chinese equipment vendor C-Data.<\/p>\n<p>Kim and Torres said they confirmed the vulnerabilities by analyzing the latest firmware running on two devices, but they believe that the same vulnerabilities impact 27 other FTTH OLT models, as they run similar firmware.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>The vulnerabilities are as bad as it gets, but by far, the worst and most disturbing of the seven is the presence of Telnet backdoor accounts hardcoded in the firmware.<\/p>\n<p>The accounts allow attackers to connect to the device via a Telnet server running on the device&#8217;s WAN (internet-side) interface. Kim and Torres said the accounts granted intruders full administrator CLI access.<\/p>\n<p>The two researchers said they found four username-password combinations hidden in the C-Data firmware, with backdoor accounts differing per device, based on the device model and firmware version.<\/p>\n<p><em>suma123\/panger123<\/em><br \/><em>debug\/debug124<\/em><br \/><em>root\/root126<\/em><br \/><em>guest\/[empty]<\/em><\/p>\n<p>But this initial backdoor CLI access could then be used to exploit other vulnerabilities. For example, Kim and Torres said an attacker could also exploit a second bug to list credentials in cleartext in the Telnet CLI for all the other device administrators; credentials that could be used at a later point in case the backdoor account is removed.<\/p>\n<p>A third vulnerability also allowed the attacker to execute shell commands with root privileges from any CLI account.<\/p>\n<p>The fourth bug was discovered in the same Telnet server running on the WAN interface. Kim and Torres said that this server could be abused to crash the FTTH OLT device. Since the server was running by default on the WAN interface, this bug could be used to sabotage an ISP&#8217;s network if they&#8217;re not filtering traffic towards the FTTH OLT devices.<\/p>\n<p>But the devices were also running a web server that was included to power the device&#8217;s management web panel. Here, Kim and Torres found the fifth bug. Just by downloading six text files from this web server, an attacker could get his hands on cleartext account credentials for the device&#8217;s web interface, Telnet server, and SNMP interface.<\/p>\n<p>In case any of the passwords are found in an encrypted format, Kim and Torres say that this is not a problem either, as credentials are usually secured with an easy to break XOR function.<\/p>\n<p>And last, but not least, the two researchers pointed out that all management interfaces on the tested devices ran in cleartext modes, with HTTP rather than HTTPS, Telnet instead of SSH, and so on. They said this opened devices and the ISPs that used them to easy MitM (man-in-the-middle) attacks.<\/p>\n<h3>Full disclosure<\/h3>\n<p>Kim and Torres said they published their findings today without notifying the vendor as they believe some of the backdoors were intentionally placed in the firmware by the vendor.<\/p>\n<p>C-Data was not immediately available for comment.<\/p>\n<p>The two also say that identifying all vulnerable devices will also be a problem for ISPs, as some of the vulnerable equipment also appears to have been sold as a white-label product, under different brands, such as OptiLink, V-SOL CN, BLIY, and possibly others.<\/p>\n<p>Below is the list of vulnerable C-Data FTTH OLT models:<\/p>\n<ul>\n<li>72408A<\/li>\n<li>9008A<\/li>\n<li>9016A<\/li>\n<li>92408A<\/li>\n<li>92416A<\/li>\n<li>9288<\/li>\n<li>97016<\/li>\n<li>97024P<\/li>\n<li>97028P<\/li>\n<li>97042P<\/li>\n<li>97084P<\/li>\n<li>97168P<\/li>\n<li>FD1002S<\/li>\n<li>FD1104<\/li>\n<li>FD1104B<\/li>\n<li>FD1104S<\/li>\n<li>FD1104SN<\/li>\n<li>FD1108S<\/li>\n<li>FD1108SN <\/li>\n<li>FD1204S-R2<\/li>\n<li>FD1204SN<\/li>\n<li>FD1204SN-R2<\/li>\n<li>FD1208S-R2<\/li>\n<li>FD1216S-R1<\/li>\n<li>FD1608GS<\/li>\n<li>FD1608SN<\/li>\n<li>FD1616GS<\/li>\n<li>FD1616SN<\/li>\n<li>FD8000<\/li>\n<\/ul>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The backdoor accounts grant access to a secret Telnet admin account running on the devices&#8217; external WAN interface.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36038,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-10T11:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data\",\"datePublished\":\"2020-07-10T11:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/\",\"name\":\"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png\",\"datePublished\":\"2020-07-10T11:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/","og_locale":"en_US","og_type":"article","og_title":"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-10T11:30:00+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data","datePublished":"2020-07-10T11:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/"},"wordCount":749,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/","url":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/","name":"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png","datePublished":"2020-07-10T11:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data.png","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36037"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36037\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36038"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}