Netopia Router Crafted SNMP Request Remote Admin Password Disclosure

Critical Nessus Plugin ID 22415


The remote router allows anonymous users to retrieve the administrative password


The remote host appears to be running a Netopia router with SNMP enabled.
Further, the Netopia router is using the default SNMP community strings.
This version of the Netopia firmware is vulnerable to a flaw wherein a remote attacker can, by sending a specially formed SNMP query, retrieve the Administrative password.

An attacker, exploiting this flaw, would only need to be able to send SNMP queries to the router using the default community string of 'public'.
Successful exploitation would result in the attacker gaining administrative credentials to the router.


Contact the vendor for a patch. Change the default SNMP community string to one that is not easily guessed.

See Also

Plugin Details

Severity: Critical

ID: 22415

File Name: snmp_netopia.nasl

Version: $Revision: 1.13 $

Type: remote

Family: Misc.

Published: 2006/09/20

Modified: 2013/01/25

Dependencies: 19762, 11153

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SNMP/community

Reference Information

OSVDB: 58635