AirConnect Default Password

This script is Copyright (C) 2002-2014 Digital Defense Inc.

Synopsis :

It is possible to access the remote wireless access point with default

Description :

This AirConnect wireless access point still has the default password
set for the web interface. This could be abused by an attacker to gain
full control over the wireless network settings.

Solution :

Change the password to something difficult to guess via the web

Risk factor :

High / CVSS Base Score : 7.5
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 10961 (DDI_AirConnect_Default_Password.nasl)

Bugtraq ID:

CVE ID: CVE-1999-0508

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now