This script is Copyright (C) 2002-2014 Digital Defense Inc.
It is possible to access the remote wireless access point with default
This AirConnect wireless access point still has the default password
set for the web interface. This could be abused by an attacker to gain
full control over the wireless network settings.
Change the password to something difficult to guess via the web
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true
Nessus Plugin ID: 10961 (DDI_AirConnect_Default_Password.nasl)
CVE ID: CVE-1999-0508