This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.
The remote network device has a hard-coded user account with
The remote device is running RuggedCom RuggedOS (ROS). Using the user
name 'factory' and a password derived from the MAC address of the
device (which is present in the telnet login banner), Nessus was able
to successfully log into the device via a built-in backdoor account.
See also :
Upgrade to the latest RuggedOS firmware version per the vendor's
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true