Search criteria

6 vulnerabilities found for wg602 by netgear

VAR-200412-0825

Vulnerability from variot - Updated: 2025-04-03 22:10

NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account. This issue can allow a remote attacker to gain administrative access to the device. Netgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue. It is likely that other versions of the firmware are also vulnerable. It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0825",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wg602",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "1.7.14"
      },
      {
        "model": "wgt624",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "0"
      },
      {
        "model": "wg602 access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "1.7.14"
      },
      {
        "model": "wg602 access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "1.04.0"
      },
      {
        "model": "wg602v2 access point rc6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "3.2"
      },
      {
        "model": "wg602v2 access point rc5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "3.1"
      },
      {
        "model": "wg602v2 access point rc2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "3.1"
      },
      {
        "model": "wg602v2 access point rc5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "2.0"
      },
      {
        "model": "wg602v2 access point",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": "wg602 access point",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "1.7.15"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery is credited to Tom Knienieder \u003cknienieder@khamsin.ch\u003e.",
    "sources": [
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2004-2557",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-2557",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-10985",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-2557",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-414",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-10985",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10985"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account.  This issue can allow a remote attacker to gain administrative access to the device. \nNetgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue.  It is likely that other versions of the firmware are also vulnerable.  It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "VULHUB",
        "id": "VHN-10985"
      }
    ],
    "trust": 1.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-2557",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "10459",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "11773",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "6743",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414",
        "trust": 0.7
      },
      {
        "db": "CIAC",
        "id": "O-159",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20040605 RE: NETGEAR WG602 ACCESSPOINT VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20040603 NETGEAR WG602 ACCESSPOINT VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "602",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16312",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "16835",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-10985",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10985"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "id": "VAR-200412-0825",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10985"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:10:39.175000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/10459"
      },
      {
        "trust": 1.7,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/365230"
      },
      {
        "trust": 1.7,
        "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/6743"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/11773"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
      },
      {
        "trust": 0.6,
        "url": "http://www.netgear.com/support_main.asp"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16312"
      },
      {
        "trust": 0.3,
        "url": "http://kbserver.netgear.com/products/wgt624.asp"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/426187"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com/products/prod_details.php?prodid=170"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365380"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365292"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365150"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365157"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365230"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365309"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365303"
      },
      {
        "trust": 0.1,
        "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026amp;tid=172"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10985"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-10985"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10985"
      },
      {
        "date": "2006-02-27T00:00:00",
        "db": "BID",
        "id": "16835"
      },
      {
        "date": "2004-06-03T00:00:00",
        "db": "BID",
        "id": "10459"
      },
      {
        "date": "2004-12-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "date": "2004-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10985"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "16835"
      },
      {
        "date": "2004-06-03T00:00:00",
        "db": "BID",
        "id": "10459"
      },
      {
        "date": "2006-01-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2004-2557"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Netgear WG602 Wireless Access Point Default Backdoor Account Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-414"
      }
    ],
    "trust": 1.2
  }
}

VAR-200412-0824

Vulnerability from variot - Updated: 2025-04-03 22:10

NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username "super" and password "5777364", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account. This issue can allow a remote attacker to gain administrative access to the device. Netgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue. It is likely that other versions of the firmware are also vulnerable. It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed. Remote attackers can use this vulnerability to modify the configuration

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0824",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wg602",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "1.5.67"
      },
      {
        "model": "wg602",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "1.04.0"
      },
      {
        "model": "wgt624",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "0"
      },
      {
        "model": "wg602 access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "1.7.14"
      },
      {
        "model": "wg602 access point",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "1.04.0"
      },
      {
        "model": "wg602v2 access point rc6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "3.2"
      },
      {
        "model": "wg602v2 access point rc5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "3.1"
      },
      {
        "model": "wg602v2 access point rc2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "3.1"
      },
      {
        "model": "wg602v2 access point rc5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "2.0"
      },
      {
        "model": "wg602v2 access point",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": "wg602 access point",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netgear",
        "version": "1.7.15"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery is credited to Tom Knienieder \u003cknienieder@khamsin.ch\u003e.",
    "sources": [
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2004-2556",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-2556",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-10984",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-2556",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-746",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-10984",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10984"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account.  This issue can allow a remote attacker to gain administrative access to the device. \nNetgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue.  It is likely that other versions of the firmware are also vulnerable.  It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed. Remote attackers can use this vulnerability to modify the configuration ",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "VULHUB",
        "id": "VHN-10984"
      }
    ],
    "trust": 1.53
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-2556",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "10459",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "11773",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "6743",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746",
        "trust": 0.7
      },
      {
        "db": "CIAC",
        "id": "O-159",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20040605 RE: NETGEAR WG602 ACCESSPOINT VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20040603 NETGEAR WG602 ACCESSPOINT VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "602",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16312",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "16835",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-10984",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10984"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "id": "VAR-200412-0824",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10984"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:10:38.945000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/10459"
      },
      {
        "trust": 1.7,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/365230"
      },
      {
        "trust": 1.7,
        "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
      },
      {
        "trust": 1.7,
        "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/6743"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/11773"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
      },
      {
        "trust": 0.6,
        "url": "http://www.netgear.com/support_main.asp"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16312"
      },
      {
        "trust": 0.3,
        "url": "http://kbserver.netgear.com/products/wgt624.asp"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/426187"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com/products/prod_details.php?prodid=170"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365380"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365292"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365150"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365157"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365230"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365309"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/365303"
      },
      {
        "trust": 0.1,
        "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026amp;tid=172"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-10984"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-10984"
      },
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10984"
      },
      {
        "date": "2006-02-27T00:00:00",
        "db": "BID",
        "id": "16835"
      },
      {
        "date": "2004-06-03T00:00:00",
        "db": "BID",
        "id": "10459"
      },
      {
        "date": "2004-12-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "date": "2004-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-10984"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "16835"
      },
      {
        "date": "2004-06-03T00:00:00",
        "db": "BID",
        "id": "10459"
      },
      {
        "date": "2006-01-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2004-2556"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Netgear WG602 Wireless Access Point Default Backdoor Account Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "16835"
      },
      {
        "db": "BID",
        "id": "10459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-746"
      }
    ],
    "trust": 1.2
  }
}

CVE-2004-2556 (GCVE-0-2004-2556)

Vulnerability from cvelistv5 – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username "super" and password "5777364", which allows remote attackers to modify the configuration.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
URL Tags
http://www.securityfocus.com/archive/1/365230 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/10459 vdb-entryx_refsource_BID
http://archives.neohapsis.com/archives/bugtraq/20… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://slashdot.org/articles/04/06/08/1319206.sht… x_refsource_MISC
http://kbserver.netgear.com/kb_web_files/n101383.asp x_refsource_CONFIRM
http://www.osvdb.org/6743 vdb-entryx_refsource_OSVDB
http://www.ciac.org/ciac/bulletins/o-159.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://secunia.com/advisories/11773 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2004-06-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:29:14.079Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/365230"
          },
          {
            "name": "10459",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10459"
          },
          {
            "name": "20040603 Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
          },
          {
            "name": "netgearwg602-default-account(16312)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
          },
          {
            "name": "6743",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6743"
          },
          {
            "name": "O-159",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
          },
          {
            "name": "11773",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/365230"
        },
        {
          "name": "10459",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10459"
        },
        {
          "name": "20040603 Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
        },
        {
          "name": "netgearwg602-default-account(16312)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
        },
        {
          "name": "6743",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6743"
        },
        {
          "name": "O-159",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
        },
        {
          "name": "11773",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/365230"
            },
            {
              "name": "10459",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10459"
            },
            {
              "name": "20040603 Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
            },
            {
              "name": "netgearwg602-default-account(16312)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
            },
            {
              "name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
              "refsource": "MISC",
              "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
            },
            {
              "name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
              "refsource": "CONFIRM",
              "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
            },
            {
              "name": "6743",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6743"
            },
            {
              "name": "O-159",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
            },
            {
              "name": "11773",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2556",
    "datePublished": "2005-11-21T11:00:00.000Z",
    "dateReserved": "2005-11-21T00:00:00.000Z",
    "dateUpdated": "2024-08-08T01:29:14.079Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2557 (GCVE-0-2004-2557)

Vulnerability from cvelistv5 – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
URL Tags
http://www.securityfocus.com/archive/1/365230 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/10459 vdb-entryx_refsource_BID
http://archives.neohapsis.com/archives/bugtraq/20… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://slashdot.org/articles/04/06/08/1319206.sht… x_refsource_MISC
http://kbserver.netgear.com/kb_web_files/n101383.asp x_refsource_CONFIRM
http://www.osvdb.org/6743 vdb-entryx_refsource_OSVDB
http://www.ciac.org/ciac/bulletins/o-159.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://secunia.com/advisories/11773 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2004-06-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:29:14.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/365230"
          },
          {
            "name": "10459",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10459"
          },
          {
            "name": "20040603 Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
          },
          {
            "name": "netgearwg602-default-account(16312)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
          },
          {
            "name": "6743",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6743"
          },
          {
            "name": "O-159",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
          },
          {
            "name": "11773",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/365230"
        },
        {
          "name": "10459",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10459"
        },
        {
          "name": "20040603 Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
        },
        {
          "name": "netgearwg602-default-account(16312)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
        },
        {
          "name": "6743",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6743"
        },
        {
          "name": "O-159",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
        },
        {
          "name": "11773",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/365230"
            },
            {
              "name": "10459",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10459"
            },
            {
              "name": "20040603 Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
            },
            {
              "name": "netgearwg602-default-account(16312)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
            },
            {
              "name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
              "refsource": "MISC",
              "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
            },
            {
              "name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
              "refsource": "CONFIRM",
              "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
            },
            {
              "name": "6743",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6743"
            },
            {
              "name": "O-159",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
            },
            {
              "name": "11773",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2557",
    "datePublished": "2005-11-21T11:00:00.000Z",
    "dateReserved": "2005-11-21T00:00:00.000Z",
    "dateUpdated": "2024-08-08T01:29:14.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2556 (GCVE-0-2004-2556)

Vulnerability from nvd – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username "super" and password "5777364", which allows remote attackers to modify the configuration.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
URL Tags
http://www.securityfocus.com/archive/1/365230 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/10459 vdb-entryx_refsource_BID
http://archives.neohapsis.com/archives/bugtraq/20… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://slashdot.org/articles/04/06/08/1319206.sht… x_refsource_MISC
http://kbserver.netgear.com/kb_web_files/n101383.asp x_refsource_CONFIRM
http://www.osvdb.org/6743 vdb-entryx_refsource_OSVDB
http://www.ciac.org/ciac/bulletins/o-159.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://secunia.com/advisories/11773 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2004-06-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:29:14.079Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/365230"
          },
          {
            "name": "10459",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10459"
          },
          {
            "name": "20040603 Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
          },
          {
            "name": "netgearwg602-default-account(16312)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
          },
          {
            "name": "6743",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6743"
          },
          {
            "name": "O-159",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
          },
          {
            "name": "11773",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/365230"
        },
        {
          "name": "10459",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10459"
        },
        {
          "name": "20040603 Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
        },
        {
          "name": "netgearwg602-default-account(16312)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
        },
        {
          "name": "6743",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6743"
        },
        {
          "name": "O-159",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
        },
        {
          "name": "11773",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/365230"
            },
            {
              "name": "10459",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10459"
            },
            {
              "name": "20040603 Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
            },
            {
              "name": "netgearwg602-default-account(16312)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
            },
            {
              "name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
              "refsource": "MISC",
              "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
            },
            {
              "name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
              "refsource": "CONFIRM",
              "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
            },
            {
              "name": "6743",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6743"
            },
            {
              "name": "O-159",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
            },
            {
              "name": "11773",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2556",
    "datePublished": "2005-11-21T11:00:00.000Z",
    "dateReserved": "2005-11-21T00:00:00.000Z",
    "dateUpdated": "2024-08-08T01:29:14.079Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2557 (GCVE-0-2004-2557)

Vulnerability from nvd – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
URL Tags
http://www.securityfocus.com/archive/1/365230 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/10459 vdb-entryx_refsource_BID
http://archives.neohapsis.com/archives/bugtraq/20… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://slashdot.org/articles/04/06/08/1319206.sht… x_refsource_MISC
http://kbserver.netgear.com/kb_web_files/n101383.asp x_refsource_CONFIRM
http://www.osvdb.org/6743 vdb-entryx_refsource_OSVDB
http://www.ciac.org/ciac/bulletins/o-159.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://secunia.com/advisories/11773 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2004-06-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:29:14.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/365230"
          },
          {
            "name": "10459",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10459"
          },
          {
            "name": "20040603 Netgear WG602 Accesspoint vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
          },
          {
            "name": "netgearwg602-default-account(16312)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
          },
          {
            "name": "6743",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/6743"
          },
          {
            "name": "O-159",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
          },
          {
            "name": "11773",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/365230"
        },
        {
          "name": "10459",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10459"
        },
        {
          "name": "20040603 Netgear WG602 Accesspoint vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
        },
        {
          "name": "netgearwg602-default-account(16312)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
        },
        {
          "name": "6743",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/6743"
        },
        {
          "name": "O-159",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
        },
        {
          "name": "11773",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/365230"
            },
            {
              "name": "10459",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10459"
            },
            {
              "name": "20040603 Netgear WG602 Accesspoint vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
            },
            {
              "name": "netgearwg602-default-account(16312)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
            },
            {
              "name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
              "refsource": "MISC",
              "url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
            },
            {
              "name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
              "refsource": "CONFIRM",
              "url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
            },
            {
              "name": "6743",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/6743"
            },
            {
              "name": "O-159",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
            },
            {
              "name": "11773",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2557",
    "datePublished": "2005-11-21T11:00:00.000Z",
    "dateReserved": "2005-11-21T00:00:00.000Z",
    "dateUpdated": "2024-08-08T01:29:14.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}