Summary
The remote switch/routers uses the default password.
This means that anyone who has (downloaded) a user manual can telnet to it and gain administrative access.
Solution
telnet this switch/router and change all passwords (check the manual for default users)
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- VMware Product(s) Local Privilege Escalation Vulnerability
- Adobe Flash Media Server Privilege Escalation Vulnerability
- Mozilla Firefox Chrome Privilege Escalation Vulnerability Aug-09 (Linux)
- Mozilla Products 'NoWaiverWrapper' Privilege Escalation Vulnerability (Mac OS X)
- Panda Products Privilege Escalation Vulnerability