Customers are given access to 20 pages from router login setup page after logging in successfully. (http://192.168.1.1: user: user)
These pages give us basic management abilities which are far away from being root. So, I went though source code to see if I can get something juicy, and I did. I viewed source code of menu.html which was iframed in home page as sidebar. There were 3 js files: menuTree.js, menuTitle.js and menuBcm.js. The third js file contained the list of almost all the pages of router and the 2nd js file contained their corresponding name. From those js files I was able to get access to many hidden pages which weren't supposed to be accessible by user account. Also, at the end of menuBcm.js, I saw this interesting code:
if ( user == 'admin' )
menuAdmin(options);
else if ( user == 'support' )
menuSupport(options);
else if ( user == 'user' )
menuUser();
I just found out that there were two accounts other than user account. The customers are only given access to user account, we couldn't even change password of admin or support user from Access Control section. So, I tried logging in with probable passwords for admin and support user, but failed. Anyways, from the above code, It was pretty clear that the js files shows the pages list in sidebar based on the privilege of users. But one can easily see all the pages from the js file. So we can directly go to the certain pages and get admin accessible pages from user account. Some pages were just blank. But I still didn't see any pages for ssh, telnet and port forwarding stuffs.
So I had to google and find more hidden pages. For this, I collected the general router page directories and brute-forced.
So, here's the list of pages we were given access to as a user and here's the list of hidden pages I found. Some pages I thought are not so important are commented out to make it look little cleaner. The order may not be accurate since I kept them guessing randomly.