/CA8271x

Hacking EN-XGSFPP-OMAC, XG-99S, LTF-7263-BH+LTF-7267-BH+

GNU General Public License v3.0GPL-3.0

Hacking CA8271x XGS-PON Stick

  • Rewrite S/N, Loid, PLOAM, etc… for your ISP FTTx
  • Switch between 10GEPON and XGSPON.

This content is maintained by reverse engineering by enthusiasts. Use of this content is at your own risk!

XGS-PON ONT

10GE/XGS-PON ONT Form PON SoC OEM Mgmt IP Mgmt
CIG XG-99S SFP+ XGS, XG CA8271S - 192.168.100.1 UART/Telnet
CIG XE-99S SFP+ 10GE CA8271S - 192.168.0.1 UART/Telnet/SSH
Nokia XS-010S-Q SFP+ XGS, XG CA8271S CIG XG-99S (old model) 192.168.100.1 UART/Telnet
ECIN EN-XGSFPP-OMAC-V1
End of Sales
SFP+ XGS, XG CA8271S CIG XG-99S (old model) 192.168.100.1 UART/Telnet
ECIN EN-XGSFPP-OMAC-V2
Not CA8271x SoC
SFP+ XGS MxL PRX126 AZORES WAS-110 192.168.11.1 Telnet/Web
FS XGS-ONU-25-20NI SFP+ XGS, XG CA8271S CIG XG-99S 192.168.100.1 UART/Telnet
Hisense LTF-7263-BH+ SFP+ 10GE (XGS, XG) CA8271S - 192.168.0.1 UART/SSH/Web
Hisense LTF-7267-BH+ SFP+ XGS, XG (10GE) CA8271S - 192.168.0.1 UART/SSH/Web
NATYWISH LTF-7267-BH+ SFP+ XGS, XG CA8271S Hisense LTF-7267-BH+
(NATYWISH Custom Farm)
192.168.1.1 UART/Telnet/Web
XGS800E SFP+ XGS, XG (10GE) CA8271S Hisense LTF-7267-BH+ 192.168.0.1 UART/Telnet/Web
CIG XG-99M ONT XGS CA8271A - 192.168.0.1 UART/Telnet
Nokia XS-010X-Q ONT XGS CA8271A CIG XG-99YF 192.168.100.1 UART/Telnet/SSH/Web
Frontier FOX222 ONT XGS CA8271A CIG XG-99M 192.168.188.1 UART
NTT 10G-EPON <O>C ONU <4> ONT 10GE NLD0605APB
(CA8271 OEM)
- 192.168.1.1 UART
NTT 10G-EPON <M>C ONU <4> ONT 10GE NLD0605APB
(CA8271 OEM)
- 192.168.1.1 UART

The CIG XE-99S and CIG XG-99S (and OEM’s) have the same hardware and can be switched by replacing the firmware.

Quick Start

XGS-PON

For the quick start of XGS-PON, we are porting it to Hack-GPON.org !

Quick script

A useful script has been developed by @rssor FS.com XGS-ONU-25-20NI / CIG XG-99S Modification Utility

xPON SFP ONU (RTL960x)

The RLT960x hacking was carried out by @anime4000
For RTL960x xPON Hacking, checkout @anime4000 on Hacking RTL960x !

AZORES WAS-110 (MxL PRX126)

The RLT960x hacking was carried out by 8311 community.
For WAS-110 Hacking, checkout PON dot WIKI !

Menu

switches dependent

  • This Stick is reported to the SFP as an "unknown module". For this reason, some switches such as Alaxala will not link up. (i2c-0xA0 0x03 : 0x00)
  • This Stick has its own vendor name registered in the vendor information, so it will not link up on switches with vendor lock enabled.
  • Some switches may refuse to link up if the SFP LOS pin is High. In this case, fiber must be connected to the Stick.

Collaborator

Some information has been created with the help of :

Thanks!


This document is a work in progress. More updates will follow.