Not sure why you ppl are surprised about this. This is not the first time VQ had such security issues, which they acknowledged and then just swept under the rug. At least this time they used 'silver lining' as an explanation to keep users quiet.
In the past, VQ users were able to login each other Zhone routers and make changes to some basic settings, mess around with WiFi settings, etc. VQ response back then was that it was NOT a 'security issue' but was an 'oversight'.
2012
Sources:
https://forums.hardwarezone.com.sg/next-generation-broadband-network-ngbn-forum-320/any-folks-viewqwest-fibre-3271541-229.html
https://forums.hardwarezone.com.sg/next-generation-broadband-network-ngbn-forum-320/any-folks-viewqwest-fibre-3271541-230.html
Quotes:
https://forums.hardwarezone.com.sg/69167894-post3431.html
https://forums.hardwarezone.com.sg/69177478-post3443.html
Screencap from a user:
VQ response:
https://forums.hardwarezone.com.sg/69177972-post3444.html
Basically they will change the Zhone passwords to random instead of default passwords, but DID they?
2015
Up to 32,000 could be affected by wireless router vulnerabilities: Security firm
Those who have login to the Zhone before would know that the Web UI shows the fibre Circuit ID, subscriber's name and residential address where the router is installed at. You'd think they would definitely change the default passwords back then, well NO!
More Recently
Just last year (or maybe 2 yrs ago), while still on VQ and was testing my own router for vulnerabilities/etc, I used
http://openresolverproject.org/ to check for open resolvers. As many may be aware, open resolvers are often used in DDoS, typically in DNS/NTP amplification attacks.
Back when the website was working (it doesn't list anything now), I was shocked to see many other VQ IPs (testing your own IP will list down entire /22 subnet of the same ISP) running open DNS resolvers. Most are Zhone devices configured in Router mode while some were Mikrotik devices. My Zhone back then was running in bridged mode, hence not affected.
Worst part was a lot of those Zhones had WAN access enabled, with the DEFAULT passwords (User/user) as mentioned
here.
This meant that anybody on the Internet is able to login and view the basic settings, which as I've mentioned earlier include the fibre Circuit ID and RESIDENTIAL address. (I've checked, they did not limit router WAN access from FiberNet subnets only, so its practically open to ALL).
So....you'd think they would have changed the DEFAULT logins and disable WAN access after the previous incidents in 2012 and 2015 (maybe more)?
As I'm no longer using this ISP, maybe those existing VQ users can verify if this indeed has been fixed.
However, the issue raised by TS makes me wonder if VQ simply just doesn't care.