Method 1:

Browser Open http://192.168.1.1/ Enter the ordinary account and password of Optical Cat to log in (can be viewed at the bottom of Optical Cat)
Then visit again: http://192.168.1.1/backupsettings.conf Download Profile
The text tool opens the configuration file, looks for the password, obtains the password string, and decrypts it with base64: http://tool.chinaz.com/Tools/Base64.aspx Get the super administrator password. The super administrator account is telecomadmin

Method 2:
If the backupsettings.conf downloaded in Method 1 does not contain a password, it may be that your lightcat firmware has been upgraded to a new version, and this vulnerability has been fixed. You can try to log in to SSH to obtain the super password.

By default, the Optical Cat has enabled SSH login. You can use telnet to test port 22 of 192.168.1.1.

Use putty to connect 192.168.1.1. The user name is admin, and the password is admin. (Because of the encryption protocol, the Xshell may not be able to connect. It is recommended to use putty here.)
Enter the command telemadmin get to obtain the optical cat super password

Method 3:
Try password:

 nE7jA%5m

Original link