Synopsis
The remote access point has an account that uses a default password.
Description
The remote EDIMAX Wireless Access Point ships with a default account ('guest' / '1234') that has backup privileges on the remote configuration file. A remote attacker can exploit this to obtain a plaintext password for the administrator account by doing a backup of the remote configuration file.
Solution
Contact the vendor for a fix. As a temporary workaround, disable the web server or filter the traffic to this access point web server via an upstream firewall.
Plugin Details
File Name: edimax_ap_guest.nasl
Supported Sensors: Nessus
Vulnerability Information
Excluded KB Items: global_settings/supplied_logins_only
Exploit Ease: No exploit is required
Vulnerability Publication Date: 6/15/2004
Reference Information
BID: 10512