This script is Copyright (C) 2002-2014 Digital Defense Inc.
It is possible to access the remote wireless access point with default
This AirConnect wireless access point still has the default password
set for the web interface. This could be abused by an attacker to gain
full control over the wireless network settings.
Change the password to something difficult to guess via the web
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true
Nessus Plugin ID: 10961 (DDI_AirConnect_Default_Password.nasl)
CVE ID: CVE-1999-0508
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.