The customer used tscan for scanning and successfully accessed the control (Ctl) component southbound address via telnet using the username and password admin/admin on port number 1830. This password is weak.
Temporary mitigation can enter each WAN pod through the iptables -A INPUT -p tcp -i eth1 --dport 1830 -j DROP command to block the port, but this command will become invalid after the pod restarts.
The latest controller (CTL) version of the ADWAN6.5 solution will be released at the end of April to fix this vulnerability.