First published: Mon Mar 06 2006(Updated: )
NETGEAR WGT624 Wireless DSL router has a default account of super_username "Gearguy" and super_passwd "Geardog", which allows remote attackers to modify the configuration. NOTE: followup posts have suggested that this might not occur with all WGT624 routers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR WGT624 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1002 is considered to have a high severity because it allows remote attackers to modify the router's configuration.
To fix CVE-2006-1002, change the default credentials from super_username "Gearguy" and super_passwd "Geardog" to strong, unique passwords.
Users of the NETGEAR WGT624 Wireless DSL router are affected by CVE-2006-1002.
No, subsequent reports suggest that not all NETGEAR WGT624 routers may be vulnerable to CVE-2006-1002.
Attackers can remotely access and modify the configuration of the NETGEAR WGT624 router using CVE-2006-1002.