Vulnerability Description
The management interface on the A-LINK WL54AP3 and WL54AP2 access points has a blank default password for the admin account, which makes it easier for remote attackers to obtain access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| A-Link | Wl54Ap2 | All versions |
| A-Link | Wl54Ap3 | All versions |
Related Weaknesses (CWE)
References
- http://www.louhinetworks.fi/advisory/alink_081028.txtExploitPatch
- http://www.securityfocus.com/archive/1/497997/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51199
- https://www.exploit-db.com/exploits/6899
- http://www.louhinetworks.fi/advisory/alink_081028.txtExploitPatch
- http://www.securityfocus.com/archive/1/497997/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51199
- https://www.exploit-db.com/exploits/6899
FAQ
What is CVE-2008-6824?
CVE-2008-6824 is a vulnerability with a CVSS score of 10.0 (HIGH). The management interface on the A-LINK WL54AP3 and WL54AP2 access points has a blank default password for the admin account, which makes it easier for remote attackers to obtain access.
How severe is CVE-2008-6824?
CVE-2008-6824 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6824?
Check the references section above for vendor advisories and patch information. Affected products include: A-Link Wl54Ap2, A-Link Wl54Ap3.