grep -i "password" /userconfig/cfg/db_user_cfg.xml Look for a tag like <Value name="Password" rw="RW" value="**[Encrypted]**"/> . Sometimes it is plain text; often it is base64 encoded.

For the enthusiast who demands root access, the is your best bet. If that fails and you are comfortable soldering, the UART method (Method 4) is the only guaranteed way to regain control.

Run the following command to dump the encrypted configuration file:

cat /userconfig/cfg/db_user_cfg.xml This outputs a massive XML file to your screen. It contains the actual Super Admin password.