- Rewrite S/N, Loid, PLOAM, etc… for your ISP FTTx
- Switch between 10GEPON and XGSPON.
This content is maintained by reverse engineering by enthusiasts. Use of this content is at your own risk!
10GE/XGS-PON ONT | Form | PON | SoC | OEM | Mgmt IP | Mgmt |
---|---|---|---|---|---|---|
CIG XG-99S | SFP+ | XGS, XG | CA8271S | - | 192.168.100.1 | UART/Telnet |
CIG XE-99S | SFP+ | 10GE | CA8271S | - | 192.168.0.1 | UART/Telnet/SSH |
Nokia XS-010S-Q | SFP+ | XGS, XG | CA8271S | CIG XG-99S (old model) | 192.168.100.1 | UART/Telnet |
ECIN EN-XGSFPP-OMAC-V1 End of Sales |
SFP+ | XGS, XG | CA8271S | CIG XG-99S (old model) | 192.168.100.1 | UART/Telnet |
ECIN EN-XGSFPP-OMAC-V2 Not CA8271x SoC |
SFP+ | XGS | MxL PRX126 | AZORES WAS-110 | 192.168.11.1 | Telnet/Web |
FS XGS-ONU-25-20NI | SFP+ | XGS, XG | CA8271S | CIG XG-99S | 192.168.100.1 | UART/Telnet |
Hisense LTF-7263-BH+ | SFP+ | 10GE (XGS, XG) | CA8271S | - | 192.168.0.1 | UART/SSH/Web |
Hisense LTF-7267-BH+ | SFP+ | XGS, XG (10GE) | CA8271S | - | 192.168.0.1 | UART/SSH/Web |
NATYWISH LTF-7267-BH+ | SFP+ | XGS, XG | CA8271S | Hisense LTF-7267-BH+ (NATYWISH Custom Farm) |
192.168.1.1 | UART/Telnet/Web |
XGS800E | SFP+ | XGS, XG (10GE) | CA8271S | Hisense LTF-7267-BH+ | 192.168.0.1 | UART/Telnet/Web |
CIG XG-99M | ONT | XGS | CA8271A | - | 192.168.0.1 | UART/Telnet |
Nokia XS-010X-Q | ONT | XGS | CA8271A | CIG XG-99YF | 192.168.100.1 | UART/Telnet/SSH/Web |
Frontier FOX222 | ONT | XGS | CA8271A | CIG XG-99M | 192.168.188.1 | UART |
NTT 10G-EPON <O>C ONU <4> | ONT | 10GE | NLD0605APB (CA8271 OEM) |
- | 192.168.1.1 | UART |
NTT 10G-EPON <M>C ONU <4> | ONT | 10GE | NLD0605APB (CA8271 OEM) |
- | 192.168.1.1 | UART |
The CIG XE-99S and CIG XG-99S (and OEM’s) have the same hardware and can be switched by replacing the firmware.
For the quick start of XGS-PON, we are porting it to Hack-GPON.org !
A useful script has been developed by @rssor FS.com XGS-ONU-25-20NI / CIG XG-99S Modification Utility
The RLT960x hacking was carried out by @anime4000
For RTL960x xPON Hacking, checkout @anime4000 on Hacking RTL960x !
The RLT960x hacking was carried out by 8311 community.
For WAS-110 Hacking, checkout PON dot WIKI !
- UART pin
- ONT Login Password
- How to get root CLI & root Shell
- ONT scfg.txt files (CORTINA SoC Configuration file)
- ONT Configuration
- NAND dump
- Picture
- This Stick is reported to the SFP as an "unknown module". For this reason, some switches such as Alaxala will not link up. (i2c-0xA0 0x03 : 0x00)
- This Stick has its own vendor name registered in the vendor information, so it will not link up on switches with vendor lock enabled.
- Some switches may refuse to link up if the SFP LOS pin is High. In this case, fiber must be connected to the Stick.
Some information has been created with the help of :
Thanks!