ID CVE-2008-6824
Summary The management interface on the A-LINK WL54AP3 and WL54AP2 access points has a blank default password for the admin account, which makes it easier for remote attackers to obtain access.
References
Vulnerable Configurations
  • cpe:2.3:h:a-link:wl54ap2:*:*:*:*:*:*:*:*
    cpe:2.3:h:a-link:wl54ap2:*:*:*:*:*:*:*:*
  • cpe:2.3:h:a-link:wl54ap3:*:*:*:*:*:*:*:*
    cpe:2.3:h:a-link:wl54ap3:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 11-10-2018 - 20:57)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bugtraq 20081031 A-Link WL54AP3 and WL54AP2 CSRF+XSS vulnerability
exploit-db 6899
misc http://www.louhinetworks.fi/advisory/alink_081028.txt
xf wl54ap3-wl54ap2-default-password(51199)
Last major update 11-10-2018 - 20:57
Published 04-06-2009 - 16:30
Last modified 11-10-2018 - 20:57
Back to Top