The WePresent WiPG-1500 device with firmware 1.0.3.7 has a manufacturer account that has a hardcoded username / password. Once the device is set to DEBUG mode, an attacker can connect to the device using the telnet protocol and log into the device with the 'abarco' hardcoded manufacturer account. This account is not documented, nor is the DEBUG feature or the use of telnetd on port tcp/5885.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:25:49.191Z
Reserved: 2017-02-26T00:00:00
Link: CVE-2017-6351
No data.
Status : Deferred
Published: 2017-03-06T02:59:00.463
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-6351
No data.
OpenCVE Enrichment
No data.