The System tab contains administrative options. This page
enables the administrator to reboot the device, set it
back to factory defaults, upload new firmware, backup or
update the configuration and configure the administrator
Device Name (Host name) is the system wide device
identifier. It is reported by the SNMP Agent to authorized
management stations. Device Name will be represented
in popular Router Operating Systems registration screens
and discovery tools.
Specifies the system identity.
Allows you to select the language
displayed in the management interface. English is the
Additional language profiles may be uploaded.
Refer to our wiki page at the following URL:
Ubiquiti Networks, Inc.
Specifies the timezone according to GMT
(Greenwich Mean Time).
Enable Startup Date
When enabled, you are able to
modify the device’s startup date.
Specifies the device’s startup date. You
can select a date by clicking the Calendar icon or typinh
it in manually. Type the date in the following format:
2 digit month/2 digit day/4 digit year. An example would
be for May 20th, 2010 your would type 05/20/2010
In this section you can modify the administrator password
to protect your device from unauthorized configuration.
The default administrator’s password should be changed
on the very first system setup:
Press this button in order to change the
Enter the current password
associated with the administrator account. It is required
to change the Password or Administrator Username.
Enter the new password for the
Verify New Password
Re-enter the new password for
the administrator account.
Password length is 8 characters maximum,
passwords exceeding 8 characters will be
Enable Read-Only Account
account and configure the username and password to
protect your device from unauthorized access. The default
option is disabled.
Press this button in order to change the
New password used for read-only
administrator authentication should be specified.
Check this to display the read-only password
characters you have typed.
Click to save changes to any of the fields on the
Chapter 3: AirOS
Specifies the name of the
Click to enable the read-only
Specifies the name of the system
Ubiquiti sells wired and wireless networking products under multiple brand names. The company also sells grid-tied solar kits.
Ubiquiti’s first product line was its «Super Range» mini-PCI radio card series, which was followed by other wireless products.
The company’s Xtreme Range (XR) cards operated on non-standard IEEE 802.11 bands, which reduced the impact of congestion in the 2.4 GHz and 5.8 GHz bands. In August 2007 a group of Italian amateur radio operators set a distance world record for point-to-point links in the 5.8 GHz spectrum. Using two XR5 cards and a pair of 35 dBi dish antennas, the Italian team was able to establish a 304 km (about 188 mi) link at data rates between 4 and 5 Mbit/s.
The company (under its «Ubiquiti Labs» brand) also manufactures a home-oriented wireless mesh network router and access point combination as a consumer-level product, called AmpliFi.
U-Boot configuration extraction
In 2013, it was discovered that there was a security issue in the version of the U-Boot shipped on Ubiquiti’s devices. It was possible to extract the plaintext configuration from the device without leaving a trace using Trivial File Transfer Protocol (TFTP) and an Ethernet cable, revealing information such as passwords.
While this issue is fixed in current versions of Ubiquiti hardware, despite many requests and acknowledging that they are using this GPL-protected application, Ubiquiti refused to provide the source code for the GNU General Public License (GPL)-licensed U-Boot. This made it impractical for Ubiquiti’s customers to fix the issue. The GPL-licensed code was released eventually.
It was reported by online reporter Brian Krebs, on June 15, 2015, that «Recently, researchers at the Fujitsu Security Operations Center in Warrington, UK began tracking Upatre being served from hundreds of compromised home routers — particularly routers powered by MikroTik and Ubiquiti’s AirOS». Bryan Campbell of the Fujitsu Security Operations Center in Warrington, UK reported, «We have seen literally hundreds of wireless access points, and routers connected in relation to this botnet, usually AirOS», said Bryan Campbell, lead threat intelligence analyst at Fujitsu. «The consistency in which the botnet is communicating with compromised routers in relation to both distribution and communication leads us to believe known vulnerabilities are being exploited in the firmware which allows this to occur».