Netopia Router Crafted SNMP Request Remote Admin Password Disclosure

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.

Synopsis :

The remote router allows anonymous users to retrieve the administrative password

Description :

The remote host appears to be running a Netopia router with SNMP enabled.
Further, the Netopia router is using the default SNMP community strings.
This version of the Netopia firmware is vulnerable to a flaw wherein
a remote attacker can, by sending a specially formed SNMP query, retrieve
the Administrative password.

An attacker, exploiting this flaw, would only need to be able to send SNMP
queries to the router using the default community string of 'public'.
Successful exploitation would result in the attacker gaining administrative
credentials to the router.

See also :

Solution :

Contact the vendor for a patch. Change the default SNMP community string to
one that is not easily guessed.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Misc.

Nessus Plugin ID: 22415 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now