So OpenWebIf contains security problems?Even with a 32 character long password, it is STILL a bad idea to forward the webinterface, ftp or telnet to the outside world. Just don't do it. It's a really really bad idea.
As for an explanation, well YOU may not understand how one could mis-use those, but I know a few methods and real criminals will probably know a few more. So don't. Please.
Let us sort out the facts:What you CAN do safely is to forward the SSH port (22). That is the only one that's safe.
Fact 1: By default, the sshd on the E2-Box uses password login, just like the WebInterface does.
Fact 2: While I agree that forwarding telnet, ftp and http to the outside world is a bad idea (Passwords are transmitted in an unencrypted way, so logging in once from an alien (W)LAN (Hotspot, other person's (W)LAN, ...) reveals that password to anyone who can use Wireshark), the WebInterface can use HTTPS, that is TLS/SSL.
Using that, neither credentials nor the payload are transferred unencrypted, actually even the URL (except the domain name) is encrypted.
This said, I want to remark that TLS/SSL is also used to secure the tunnel solution that people keep suggesting ...
Fact 3: The pure existance of Android/iOS/Whatever-Apps encourages the user to open not only https but even more services to the outside world in order to make use of them.
Conclusion:
With sshd using password login, it is from a design point of view neither more nor less secure than the WebInterface when using HTTPS.
How secure or insecure the box is on these services depends solely on the password's strength and if there are known security flaws within the software used to implement these.
BTW: If you would switch from dropbear to OpenSSH in order to implement the SSH daemon, it would be a great step forward, because OpenSSH could be used as a SOCKSv5 proxy ...