NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/365230 | mailing list |
http://www.securityfocus.com/bid/10459 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html | exploit mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16312 | vdb entry |
http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126&tid=172 | exploit |
http://kbserver.netgear.com/kb_web_files/n101383.asp | |
http://www.osvdb.org/6743 | vdb entry |
http://www.ciac.org/ciac/bulletins/o-159.shtml | third party advisory government resource |
http://secunia.com/advisories/11773 | patch vendor advisory third party advisory exploit |