|
ntwrk: Vulnerabilities: D-Link DSL-300G/DSL-300G+ Default Password Vulnerability |
|
|
Release Date: 2003-04-02
Critical: Moderately critical
Impact: System access
Where: From remote
OS: D-Link DSL-300G/DSL-300G+
Description:
It has been reported that the default password for the telnet service on D-Link DSL-300G/DSL-300G+ modems is not changed via the web administration interface.
Reportedly, even when the modem has been configured via the web administration interface and the default password has been changed, a malicious person can still connect to the telnet service and authenticate using the default password ("private"). |
|
Solution:
Reportedly, the password can be changed manually via the telnet service. The modem has to be rebooted afterwards for the changes to take effect.
Filter traffic to the telnet service. |
Go to Secunia Advisories for further details.
|
|
|
|
Posted on Wednesday, 02 April 2003 @ 17:40:23 EST by cj
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 0
Votes: 0
|
|
|