Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.17304
Category:Default Accounts
Title:Zyxel Router Default Credentials (HTTP)
Summary:The remote host is a Zyxel router with its default password set.
Description:Summary:
The remote host is a Zyxel router with its default password set.

Vulnerability Impact:
An attacker could connect to the web interface and reconfigure it.

Solution:
Change the password immediately.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2001-1135
BugTraq ID: 3346
http://www.securityfocus.com/bid/3346
Bugtraq: 20010809 ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password (Google Search)
http://www.securityfocus.com/archive/1/203022
Bugtraq: 20010810 Re: ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password (Google Search)
http://www.securityfocus.com/archive/1/203592
Bugtraq: 20010814 Fwd: ZyXEL Prestige 642 Router Administration Interface Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/204439
Bugtraq: 20010918 SECURITY RISK: ZyXEL ADSL Router 642R - WAN filter bypass from internal network (Google Search)
http://www.securityfocus.com/archive/1/214971
XForce ISS Database: prestige-wan-bypass-filter(7146)
https://exchange.xforce.ibmcloud.com/vulnerabilities/7146
Common Vulnerability Exposure (CVE) ID: CVE-1999-0571
Bugtraq: Feb5,1999 (Google Search)
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0571
CopyrightCopyright (C) 2005 Michel Arboi

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.