Many routes or W-Lan routers uses default passwords or passwords generated from the mac-address (the mac-address is publicly viewable to everyone). There is no doubt that these techniques are insecure. Especially if it's the same to the W-LAN password. So everyone could gain access to your private network and do more stuff there.
This provides a documentation on how these passwords are generated and which default passwords are used for specific devices.
Besides this should also provide details about configuring your new device. Many vendors uses different default webinterface ip-addresses and login credentials. So this can be used as a reference for helping you out.
This project is open for contributes. Just make a pull request. You also edit the file directly here on Github by using the edit button when you are in a file or the create new file button when you are in a folder.
There is a Template.md which should help how a new entry should be inserted. If something is unknown to you just enter unknown at that category.
- Press CTR + T
- Enter your vendor name
- Open the file
- Lookup for your device model
- Use the searchbar at the top
- Type in your model or vendor name
- It will search through all files