AirConnect Default Password

High Nessus Plugin ID 10961


It is possible to access the remote wireless access point with default credentials.


This AirConnect wireless access point still has the default password set for the web interface. This could be abused by an attacker to gain full control over the wireless network settings.


Change the password to something difficult to guess via the web interface.

Plugin Details

Severity: High

ID: 10961

File Name: DDI_AirConnect_Default_Password.nasl

Version: $Revision: 1.19 $

Type: remote

Family: Misc.

Published: 2002/05/22

Modified: 2014/09/17

Dependencies: 10107

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2002/09/12

Exploitable With

Metasploit (SNMP Community Scanner)

Reference Information

CVE: CVE-1999-0508

OSVDB: 785