This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote network device has a hard-coded user account with
The remote device is running RuggedOS. Using the user name 'factory'
and a password derived from the MAC address of the device (which is
present in the telnet login banner), Nessus was able to successfully
log into the device via a built-in back door account.
See also :
Upgrade to the latest RuggedOS firmware version per the vendor's
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true