Default Password 'cat1029' for 'Wproot' Account

Critical Nessus Plugin ID 104973


The remote host has an account with a default password.


The account 'Wproot' on the remote host has the default password 'cat1029'. A remote attacker can exploit this issue to gain administrative access to the affected system.

Note that this username / password combination was found in the leaked source from the Mirai botnet.


Change the password for this account or disable it.

See Also

Plugin Details

Severity: Critical

ID: 104973

File Name: account_Wproot_cat1029.nasl

Version: $Revision: 1.2 $

Type: remote

Published: 2017/12/01

Modified: 2017/12/04

Dependencies: 55900, 10267, 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND


Base Score: 9.8

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2016/10/20

Reference Information

OSVDB: 137387