GoAhead System.ini Leak
Medium Nessus Plugin ID 102174
SynopsisThe remote server is vulnerable to an information leak that could allow a remote attacker to learn the admin username and password
DescriptionThe remote server uses a version of GoAhead that allows a remote unauthenticated attacker to download the system.ini file. This file contains credentials to the web interface, ftp interface, and others.
SolutionIf possible, update the device's firmware and ensure that the HTTP server is not accessible via the internet.