A comprehensive Google search (1, 2) showed there is an easy exploit to access telnet on the device, but I'm not experienced enough in Linux to find it myself. I realize I need to mount the harddrives in an alternative manner and put a new .htpasswd file with my own root user and password, but I don't know which partition to mount or how to go about altering the file system.
edit:
Turns out you can simply mount the ext2 partition under Linux (or with fuse-ext2 under OS X) and copy /proto/SxM_webui/admin/sxmJEWAB/SXMjewab.php to /proto/SxM_webui/admin/SXMjewab.php , then put the drive back in the NAS and access the URL /admin/SXMjewab.php?telnet=jewab&debug=1
The telnet root account is user:root pass:atsahs
Careful now!
edit:
Turns out you can simply mount the ext2 partition under Linux (or with fuse-ext2 under OS X) and copy /proto/SxM_webui/admin/sxmJEWAB/SXMjewab.php to /proto/SxM_webui/admin/SXMjewab.php , then put the drive back in the NAS and access the URL /admin/SXMjewab.php?telnet=jewab&debug=1
The telnet root account is user:root pass:atsahs
Careful now!
Last edited: