Reset the device first, and next time check inside the security options ssh is not open to wan.
There is only one password the one you have setup by first use.
You can use a password manager, however usually in the correct configuration stanza your web ui is only accessible from local/and wifi, and from inside the vpn tunnels on the gateway ip of the vpn, note for vpn that a hacker still has to authenticate with keys which is one of the higher standards than a password, so that is unlikely.
You can use key authentication but that is not default by the gl ui, you need luci for that + you still need to use password only for the web ui so not 2FA its only more secure to ssh.
and you can also limit ssh or completely disable it then key authentication is also not important, again in a correct healthy firewall configuration its unlikely you get hacked via this, but a good practice always keeps: strong passwords, also if the attack was leveraged over wifi which is more rare compared if it was towards the internet 
A firewall works like:
Client -> internet (since cliënt is origin source, its accepted for the destination to talk back on the same line)
However it should never be: only with the exception as described above:
Internet -> client.
well lets guess what i think what happened here:
A: you bought a pre configured second handed router from amazon?, always reset such things.
B: it could be, your router was misconfigurated where your firewall wasn't working which indeed grants access to ssh and other things, trust me but there are alot of bots out there which easily bruteforce ssh, i can know that because when you try to install windows server on a ovh datacenter server, these bots already come in within the post installation of windows server and usually they use it to make it into a seedbox and other bad stuff, the securest way is long strong passwords or even keys.
C: it can also be it is a infected device other than your router, the issue here in is you need a little more time figuring which one it is, the isp cannot see your devices and is only aware of the orginating traffic so it only sees your router.
you could try intercepting dns with adguard or check with wireshark for suspicious traffic but best is to contact isp about what kind of type traffic it is.
You can also try disconnecting all devices and then slowly connect one for one while checking if it logs suspicioun unexpected domains or other suspicioun traffic.
Based on your level of skill you can now kinda make your assessment and try to figure out what just happened 