Search criteria
6 vulnerabilities found for wg602 by netgear
VAR-200412-0825
Vulnerability from variot - Updated: 2025-04-03 22:10NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account. This issue can allow a remote attacker to gain administrative access to the device. Netgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue. It is likely that other versions of the firmware are also vulnerable. It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200412-0825",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wg602",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "1.7.14"
},
{
"model": "wgt624",
"scope": "eq",
"trust": 0.3,
"vendor": "netgear",
"version": "0"
},
{
"model": "wg602 access point",
"scope": "eq",
"trust": 0.3,
"vendor": "netgear",
"version": "1.7.14"
},
{
"model": "wg602 access point",
"scope": "eq",
"trust": 0.3,
"vendor": "netgear",
"version": "1.04.0"
},
{
"model": "wg602v2 access point rc6",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.2"
},
{
"model": "wg602v2 access point rc5",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.1"
},
{
"model": "wg602v2 access point rc2",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.1"
},
{
"model": "wg602v2 access point rc5",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "2.0"
},
{
"model": "wg602v2 access point",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": null
},
{
"model": "wg602 access point",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "1.7.15"
}
],
"sources": [
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovery is credited to Tom Knienieder \u003cknienieder@khamsin.ch\u003e.",
"sources": [
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
}
],
"trust": 0.9
},
"cve": "CVE-2004-2557",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2004-2557",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-10985",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2004-2557",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200412-414",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-10985",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10985"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account. This issue can allow a remote attacker to gain administrative access to the device. \nNetgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue. It is likely that other versions of the firmware are also vulnerable. It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2557"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "VULHUB",
"id": "VHN-10985"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2004-2557",
"trust": 2.3
},
{
"db": "BID",
"id": "10459",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "11773",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "6743",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414",
"trust": 0.7
},
{
"db": "CIAC",
"id": "O-159",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20040605 RE: NETGEAR WG602 ACCESSPOINT VULNERABILITY",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20040603 NETGEAR WG602 ACCESSPOINT VULNERABILITY",
"trust": 0.6
},
{
"db": "XF",
"id": "602",
"trust": 0.6
},
{
"db": "XF",
"id": "16312",
"trust": 0.6
},
{
"db": "BID",
"id": "16835",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-10985",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10985"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"id": "VAR-200412-0825",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-10985"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T22:10:39.175000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/10459"
},
{
"trust": 1.7,
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"trust": 1.7,
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"trust": 1.7,
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/6743"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/11773"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"trust": 0.6,
"url": "http://www.netgear.com/support_main.asp"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/16312"
},
{
"trust": 0.3,
"url": "http://kbserver.netgear.com/products/wgt624.asp"
},
{
"trust": 0.3,
"url": "/archive/1/426187"
},
{
"trust": 0.3,
"url": "http://www.netgear.com/products/prod_details.php?prodid=170"
},
{
"trust": 0.3,
"url": "/archive/1/365380"
},
{
"trust": 0.3,
"url": "/archive/1/365292"
},
{
"trust": 0.3,
"url": "/archive/1/365150"
},
{
"trust": 0.3,
"url": "/archive/1/365157"
},
{
"trust": 0.3,
"url": "/archive/1/365230"
},
{
"trust": 0.3,
"url": "/archive/1/365309"
},
{
"trust": 0.3,
"url": "/archive/1/365303"
},
{
"trust": 0.1,
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026amp;tid=172"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10985"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-10985"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-10985"
},
{
"date": "2006-02-27T00:00:00",
"db": "BID",
"id": "16835"
},
{
"date": "2004-06-03T00:00:00",
"db": "BID",
"id": "10459"
},
{
"date": "2004-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"date": "2004-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-10985"
},
{
"date": "2016-07-06T14:40:00",
"db": "BID",
"id": "16835"
},
{
"date": "2004-06-03T00:00:00",
"db": "BID",
"id": "10459"
},
{
"date": "2006-01-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-414"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2004-2557"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Netgear WG602 Wireless Access Point Default Backdoor Account Vulnerability",
"sources": [
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-414"
}
],
"trust": 1.2
}
}
VAR-200412-0824
Vulnerability from variot - Updated: 2025-04-03 22:10NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username "super" and password "5777364", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account. This issue can allow a remote attacker to gain administrative access to the device. Netgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue. It is likely that other versions of the firmware are also vulnerable. It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed. Remote attackers can use this vulnerability to modify the configuration
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200412-0824",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wg602",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "1.5.67"
},
{
"model": "wg602",
"scope": "eq",
"trust": 1.6,
"vendor": "netgear",
"version": "1.04.0"
},
{
"model": "wgt624",
"scope": "eq",
"trust": 0.3,
"vendor": "netgear",
"version": "0"
},
{
"model": "wg602 access point",
"scope": "eq",
"trust": 0.3,
"vendor": "netgear",
"version": "1.7.14"
},
{
"model": "wg602 access point",
"scope": "eq",
"trust": 0.3,
"vendor": "netgear",
"version": "1.04.0"
},
{
"model": "wg602v2 access point rc6",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.2"
},
{
"model": "wg602v2 access point rc5",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.1"
},
{
"model": "wg602v2 access point rc2",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "3.1"
},
{
"model": "wg602v2 access point rc5",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "2.0"
},
{
"model": "wg602v2 access point",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": null
},
{
"model": "wg602 access point",
"scope": "ne",
"trust": 0.3,
"vendor": "netgear",
"version": "1.7.15"
}
],
"sources": [
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovery is credited to Tom Knienieder \u003cknienieder@khamsin.ch\u003e.",
"sources": [
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
}
],
"trust": 0.9
},
"cve": "CVE-2004-2556",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2004-2556",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-10984",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2004-2556",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200412-746",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-10984",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10984"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration. Netgear WG602 reportedly contains a default administrative account. This issue can allow a remote attacker to gain administrative access to the device. \nNetgear WG602 access point with firmware version 1.04.0 is reportedly affected by this issue. It is likely that other versions of the firmware are also vulnerable. It is reported that the new version (1.7.14) of the Firmware for WG602 is vulnerable to this issue as well, however, the username and password for the backdoor account has been changed. Remote attackers can use this vulnerability to modify the configuration ",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2556"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "VULHUB",
"id": "VHN-10984"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2004-2556",
"trust": 2.3
},
{
"db": "BID",
"id": "10459",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "11773",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "6743",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746",
"trust": 0.7
},
{
"db": "CIAC",
"id": "O-159",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20040605 RE: NETGEAR WG602 ACCESSPOINT VULNERABILITY",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20040603 NETGEAR WG602 ACCESSPOINT VULNERABILITY",
"trust": 0.6
},
{
"db": "XF",
"id": "602",
"trust": 0.6
},
{
"db": "XF",
"id": "16312",
"trust": 0.6
},
{
"db": "BID",
"id": "16835",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-10984",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10984"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"id": "VAR-200412-0824",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-10984"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T22:10:38.945000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/10459"
},
{
"trust": 1.7,
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"trust": 1.7,
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"trust": 1.7,
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/6743"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/11773"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"trust": 0.6,
"url": "http://www.netgear.com/support_main.asp"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/16312"
},
{
"trust": 0.3,
"url": "http://kbserver.netgear.com/products/wgt624.asp"
},
{
"trust": 0.3,
"url": "/archive/1/426187"
},
{
"trust": 0.3,
"url": "http://www.netgear.com/products/prod_details.php?prodid=170"
},
{
"trust": 0.3,
"url": "/archive/1/365380"
},
{
"trust": 0.3,
"url": "/archive/1/365292"
},
{
"trust": 0.3,
"url": "/archive/1/365150"
},
{
"trust": 0.3,
"url": "/archive/1/365157"
},
{
"trust": 0.3,
"url": "/archive/1/365230"
},
{
"trust": 0.3,
"url": "/archive/1/365309"
},
{
"trust": 0.3,
"url": "/archive/1/365303"
},
{
"trust": 0.1,
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026amp;tid=172"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-10984"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-10984"
},
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-12-31T00:00:00",
"db": "VULHUB",
"id": "VHN-10984"
},
{
"date": "2006-02-27T00:00:00",
"db": "BID",
"id": "16835"
},
{
"date": "2004-06-03T00:00:00",
"db": "BID",
"id": "10459"
},
{
"date": "2004-12-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"date": "2004-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-10984"
},
{
"date": "2016-07-06T14:40:00",
"db": "BID",
"id": "16835"
},
{
"date": "2004-06-03T00:00:00",
"db": "BID",
"id": "10459"
},
{
"date": "2006-01-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-746"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2004-2556"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Netgear WG602 Wireless Access Point Default Backdoor Account Vulnerability",
"sources": [
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "16835"
},
{
"db": "BID",
"id": "10459"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-746"
}
],
"trust": 1.2
}
}
CVE-2004-2556 (GCVE-0-2004-2556)
Vulnerability from cvelistv5 – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29- n/a
| URL | Tags |
|---|---|
| http://www.securityfocus.com/archive/1/365230 | mailing-listx_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/10459 | vdb-entryx_refsource_BID |
| http://archives.neohapsis.com/archives/bugtraq/20… | mailing-listx_refsource_BUGTRAQ |
| https://exchange.xforce.ibmcloud.com/vulnerabilit… | vdb-entryx_refsource_XF |
| http://slashdot.org/articles/04/06/08/1319206.sht… | x_refsource_MISC |
| http://kbserver.netgear.com/kb_web_files/n101383.asp | x_refsource_CONFIRM |
| http://www.osvdb.org/6743 | vdb-entryx_refsource_OSVDB |
| http://www.ciac.org/ciac/bulletins/o-159.shtml | third-party-advisorygovernment-resourcex_refsource_CIAC |
| http://secunia.com/advisories/11773 | third-party-advisoryx_refsource_SECUNIA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:14.079Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC",
"x_transferred"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/11773"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-06-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/11773"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2556",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
"refsource": "MISC",
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
"refsource": "CONFIRM",
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11773"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2556",
"datePublished": "2005-11-21T11:00:00.000Z",
"dateReserved": "2005-11-21T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:29:14.079Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2557 (GCVE-0-2004-2557)
Vulnerability from cvelistv5 – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29- n/a
| URL | Tags |
|---|---|
| http://www.securityfocus.com/archive/1/365230 | mailing-listx_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/10459 | vdb-entryx_refsource_BID |
| http://archives.neohapsis.com/archives/bugtraq/20… | mailing-listx_refsource_BUGTRAQ |
| https://exchange.xforce.ibmcloud.com/vulnerabilit… | vdb-entryx_refsource_XF |
| http://slashdot.org/articles/04/06/08/1319206.sht… | x_refsource_MISC |
| http://kbserver.netgear.com/kb_web_files/n101383.asp | x_refsource_CONFIRM |
| http://www.osvdb.org/6743 | vdb-entryx_refsource_OSVDB |
| http://www.ciac.org/ciac/bulletins/o-159.shtml | third-party-advisorygovernment-resourcex_refsource_CIAC |
| http://secunia.com/advisories/11773 | third-party-advisoryx_refsource_SECUNIA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:14.090Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC",
"x_transferred"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/11773"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-06-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/11773"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2557",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
"refsource": "MISC",
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
"refsource": "CONFIRM",
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11773"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2557",
"datePublished": "2005-11-21T11:00:00.000Z",
"dateReserved": "2005-11-21T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:29:14.090Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2556 (GCVE-0-2004-2556)
Vulnerability from nvd – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29- n/a
| URL | Tags |
|---|---|
| http://www.securityfocus.com/archive/1/365230 | mailing-listx_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/10459 | vdb-entryx_refsource_BID |
| http://archives.neohapsis.com/archives/bugtraq/20… | mailing-listx_refsource_BUGTRAQ |
| https://exchange.xforce.ibmcloud.com/vulnerabilit… | vdb-entryx_refsource_XF |
| http://slashdot.org/articles/04/06/08/1319206.sht… | x_refsource_MISC |
| http://kbserver.netgear.com/kb_web_files/n101383.asp | x_refsource_CONFIRM |
| http://www.osvdb.org/6743 | vdb-entryx_refsource_OSVDB |
| http://www.ciac.org/ciac/bulletins/o-159.shtml | third-party-advisorygovernment-resourcex_refsource_CIAC |
| http://secunia.com/advisories/11773 | third-party-advisoryx_refsource_SECUNIA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:14.079Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC",
"x_transferred"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/11773"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-06-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/11773"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2556",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username \"super\" and password \"5777364\", which allows remote attackers to modify the configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
"refsource": "MISC",
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
"refsource": "CONFIRM",
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11773"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2556",
"datePublished": "2005-11-21T11:00:00.000Z",
"dateReserved": "2005-11-21T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:29:14.079Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2557 (GCVE-0-2004-2557)
Vulnerability from nvd – Published: 2005-11-21 11:00 – Updated: 2024-08-08 01:29- n/a
| URL | Tags |
|---|---|
| http://www.securityfocus.com/archive/1/365230 | mailing-listx_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/10459 | vdb-entryx_refsource_BID |
| http://archives.neohapsis.com/archives/bugtraq/20… | mailing-listx_refsource_BUGTRAQ |
| https://exchange.xforce.ibmcloud.com/vulnerabilit… | vdb-entryx_refsource_XF |
| http://slashdot.org/articles/04/06/08/1319206.sht… | x_refsource_MISC |
| http://kbserver.netgear.com/kb_web_files/n101383.asp | x_refsource_CONFIRM |
| http://www.osvdb.org/6743 | vdb-entryx_refsource_OSVDB |
| http://www.ciac.org/ciac/bulletins/o-159.shtml | third-party-advisorygovernment-resourcex_refsource_CIAC |
| http://secunia.com/advisories/11773 | third-party-advisoryx_refsource_SECUNIA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:14.090Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC",
"x_transferred"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/11773"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-06-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC"
],
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/11773"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2557",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username \"superman\" and password \"21241036\", which allows remote attackers to modify the configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20040605 Re: Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/365230"
},
{
"name": "10459",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10459"
},
{
"name": "20040603 Netgear WG602 Accesspoint vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html"
},
{
"name": "netgearwg602-default-account(16312)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16312"
},
{
"name": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172",
"refsource": "MISC",
"url": "http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126\u0026tid=172"
},
{
"name": "http://kbserver.netgear.com/kb_web_files/n101383.asp",
"refsource": "CONFIRM",
"url": "http://kbserver.netgear.com/kb_web_files/n101383.asp"
},
{
"name": "6743",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6743"
},
{
"name": "O-159",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/o-159.shtml"
},
{
"name": "11773",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11773"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2557",
"datePublished": "2005-11-21T11:00:00.000Z",
"dateReserved": "2005-11-21T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:29:14.090Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}