-
-
Save theodric/c8f280ead3b5ae1b4b1d6c4cf2d9420e to your computer and use it in GitHub Desktop.
| 0. Don't have a SIM card in when you're updating radio firmware or it will bomb out partway through as it changes from internal IP to IP passthrough | |
| 1. Disable external IP passthrough mode: Network Setting -> Broadband -> Cellular APN -> #1 -> Modify icon -> "IP Passthrough" slider to off | |
| 2. Use "management" Wi-Fi AP as general Wi-Fi AP (with limitations) -> Network Setting -> Bridge1 -> Modify icon -> Move the Wi-Fi AP interface to the pane on the right alongside LAN1 | |
| NOTE: by default, once you do the above, the router will happily pass traffic from devices on the Wi-Fi AP to other devices on the LAN1 subnet, but will block traffic originating from the Wi-Fi AP from exiting to the Internet via the LTE side of the device. You can clumsily hack around this by setting another device, e.g. another Wi-Fi AP or Raspberry Pi or Cray supercomputer, as the default gateway for the LAN1 subnet in your DHCP server config, and pointing *that* device at the Zyxel as *its* default GW. This adds additional hops, but enables general use of the Zyxel's inbuilt Wi-Fi AP. | |
| 3. Supervisor password allows Linux shell login & additional functions. | |
| cf. https://openwrt.org/toh/zyxel/nr7101 "Supervisor password" | |
| summary: get this https://get.dyn.mork.no/zyxel_pwgen.tar.gz [mirror: https://github.com/theodric/pastebin/blob/master/zyxel_pwgen.tar.gz] and run it under qemu with the getsupervisor.sh script and the system serial number. Login ssh supervisor@the.router.ip.address; password is the string generated by the tool | |
| 3a. The supervisor password is also the root password, and that lets you do pretty much whatever including breaking iptables. | |
| 4. As Supervisor (see 3 above) turn off fucking annoying flashing orange Wi-Fi LED that the router turns on whenever the Wi-Fi AP is active: `/sbin/zyledctl WIFI off` <- maybe script this | |
| 5. **TBD** How to remove the softblock preventing Wi-Fi AP-sourced traffic from accessing the LTE gateway. iptables is doing this, but I haven't yet tried to undo it. | |
| 6. As of 2022-06-07 the latest firmware is not in Zyxel's Download Library, but pinned to a forum post here https://support.zyxel.eu/hc/en-us/articles/360021563900-NR7101-Connectivity-issues-and-firmware-fix-for-unsupported-frequency-bands-5G-NSA-B8-N1- | |
| 7. 2023-March-16 | |
| @giorgix3 commented on this gist with the following information about retrieving SMS: | |
| "You can actually read SMS by talking to the modem via tty. Login via SSH and then: | |
| cat /dev/ttyUSB2 & | |
| echo "AT+CMGR=1" > /dev/ttyUSB2 | |
| by changing the number after CMGR=# you can read other messages in the memory. The detailed documentation of the commands to talk to the modem can be found here https://www.quectel.com/wp-content/uploads/2021/05/Quectel_RG50xQRM5xxQ_Series_AT_Commands_Manual_V1.1.pdf " | |
| 8. 2023-March-21 | |
| Quectel has a video tutorial on using AT commands to read and send SMS here: https://forums.quectel.com/t/how-to-send-and-receive-sms-messages-on-quectel-module/15555 | |
| Of note: echo 'AT+CMGL="all"' > /dev/ttyUSB2 dumps all received SMS to the screen at once | |
| This may be a red herring, but I'll say it here anyway: I was only getting hex gibberish on the screen with the AT+CMGR command above until I had issued `echo "AT+CMGF=1" > /dev/ttyUSB2` to the modem. | |
| 9. 2023-08-20 | |
| @Manu99it discovered a means to obtain supervisor/root password on the newer (post-2022?) hardware/firmware revisions that use a different password generation algorithm: | |
| https://gist.github.com/theodric/c8f280ead3b5ae1b4b1d6c4cf2d9420e?permalink_comment_id=4666079#gistcomment-4666079 | |
| "Reading https://th0mas.nl/2020/03/26/getting-root-on-a-zyxel-vmg8825-t50-router/#fnref:1 I understood that all password, even for root and supervisor users are contained into the zcfg_config.json file. Actually in my router accessing this file is much simple: just set up FTP by webgui, access FTP as admin user (I used MiXplorer on Android for example) and zcfg_config.json is just here. The absurd thing: it has rw permission even with admin user! So just open it and copy the encrypted password under the root user (not the default password as per the guide linked, that's the same that you can calculate with the emulator). Now we can decrypt this encrypted password just by using the DynamicDNS as oracle explained in the guide: set a fake DDNS in webgui. Download the backup file. Open the backup file and replace the encrypted password under DynamicDNS with our encrypted password of root user copied before. Now save and restore the file from webgui. Go to ddns settings and just read the password: it's clear. As just as that!" | |
drsn00ker
commented
Dec 20, 2025
Thanks! unfortunately the passwords didn't work for the S21 serial with ABUV.10 firmware, but i did manage to obtain the password through the ddns method.
Hi,
I forget the admin password from my NR7101 device My SN:S200Z41021575.
Thanks!
@janiskirfa-gif Like many before you this might not be the correct password, but good luck!

@drsn00ker Thanks
Hello, its still possible to have the password for
SN S220Z44008486
thinks for your effort
Thanks a lot
unfortunately the passwords didn't work for n5013e on B15 FW
Hi, Could you send me the name and password?? Thank you very much
NR7103 S/N: S230Z21017819
@No-WaY-SA yeah the newer the model the less likely the old algorithms work. Only @friday knows....
@Tigervzoo S230 is super new, these below are unlikely to work. But give it a try no matter what, username can be admin, root or supervisor

You mean @friday can provide the code?
@friday on the zyxel community forums, not sure if they ever visit this thread....
Thank you for your efforts, but they are not working. Who should I contact?
This is GitHub. I'm definitely not friday on the zyxel community forums
Try here:
https://community.zyxel.com/en/discussion/21066/how-get-supervisor-od-root-password-of-nr7103-modem/p9
Perhaps their Friday will bless you with the correct password, but they haven't been around in awhile...
Sent in this thread sane time I posted here but still no reply there , Friday latest activity in sep 2025
A new-ish firmware for the Zyxel O2 in Czech contains an algo I have not seen before. In /bin/zycli

It produces an 8 character long password with charset="3478ABCDEFGHJKLMNPQRTUVWXY"
For those that have found the admin password via other means, can you confirm or deny that it matches those characteristics.
If it does, I'll try to reverse engineer it.
@drsn00ker do you think 3478ABCDEFGHJKLMNPQRTUVWXY is the administrator password? I'm new to this. thanks for understanding
@drsn00ker By any chance, can i try it for SN: S230Z11005178
The device is few years old, comes from Slovak O2 operator. Only user interface available, not posible to flash it back to original Zyxel V1.00(ACCZ.1)C0
Thank you in advance
@Tigervzoo it could be (not confirmed) 8 characters pseudo-randomly selected from "3478ABCDEFGHJKLMNPQRTUVWXY"
I'd love to hear from somebody that it is correct before I spend the energy to reverse the algorithm.
@drsn00ker By any chance, can i try it for SN: S230Z11005178 The device is few years old, comes from Slovak O2 operator. Only user interface available, not posible to flash it back to original Zyxel V1.00(ACCZ.1)C0
Thank you in advance
@staman81 aký máš login do používateľského rozhrania a heslo? Ďakujem tiež mám od O2.
Please let me know if these are correct. It's using the keygen from /bin/zycli from the Zyxel O2.
S230Z11005178 - VAARTH8G
S230Z21017819 - 48DLE4AJ
Chances are they are not, but give them a try!
Please let me know if these are correct. It's using the keygen from /bin/zycli from the Zyxel O2. S230Z11005178 - VAARTH8G S230Z21017819 - 48DLE4AJ Chances are they are not, but give them a try!
hi, it doesn't work for me.
Please let me know if these are correct. It's using the keygen from /bin/zycli from the Zyxel O2. S230Z11005178 - VAARTH8G S230Z21017819 - 48DLE4AJ Chances are they are not, but give them a try!
@drsn00ker I'm sorry but these are incorrect for 178.
i've tried all of them as "user" "admin" and "superuser".
This NR7103 comes from Slovak O2 operator. I'm not able to log in not even as an user to access web UI.
Can this be flashed back to Zyxel V1.00(ACCZ.1)C0 factory firmware somehow? Will zycast work on this? Does anyone knows ?
Oh well, another keygen algorithm inside the firmware that isn't actually used.
Not sure about flashing. I guess you'll just have to wait for Friday to show up again on the Zyxel community forum.
I understand, unfortunately the situation is desperate. As a user, I have absolutely no access to the NR7103 device from the CZ/SK O2 operator, which was flashed at the factory by Zyxel itself with custom firmware modified for the O2 customer. Even O2 doesn't have admin access. They've repeatedly confirmed this to me from multiple sources. If true, it's impossible to flash this device back to original Zyxel firmware.
I can confirm the Zycast method doesn't work either. The NR7103 has UDP broadcast disabled; after boot, I tried capturing packets with Wireshark, but aside from standard DHCP requests and DNS queries, there's absolutely nothing. Later HTTPS on 443 and SSH on 22, but without login credentials, it's useless. As @drsn00ker also confirmed, guessing the admin login based on S/N doesn't work on these O2 ISP SN23 units. I can throw the device in the trash.
PS: I tried contacting Zyxel US, EU, CZ/SK. US knows absolutely nothing and can't help—the device wasn't even sold on their market, and they say they lack EU resources. EU immediately sent me packing; the device was supplied under a partner project, and they provide no warranty or post-warranty support—told me to contact the ISP. Despite repeated pleading, I got nowhere; they stopped communicating. I fared even worse with CZ/SK Zyxel support—they wouldn't even talk to me :(
So if anyone has the option to buy an NR7103 from the CZ/SK market, hands off. It's an unusable device.
Have been trying to flash a Zyxel t54 SN23 from same provider in nl (t-mobile) with DX-5401-B1 fw. Uses proprietary fw and it is also totally locked down. Pw algo's not working. Zycast not working.
Anyone else tried?
The good old days of reflashing these devices seem to be gone forever!
@drsn00ker Hey, if possible could you please give me the passwords screenshot for SN: S230Z19004337
Thank you for your efforts!

