mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 02:31:35 +00:00
13 lines
1.2 KiB
Markdown
13 lines
1.2 KiB
Markdown
## SOPHOS-Netgenie Default Password
|
|
|
|
| **Vulnerability** | **SOPHOS-Netgenie Default Password** |
|
|
| :----: | :-----|
|
|
| **Chinese name** | SOPHOS-Netgenie 默认口令 |
|
|
| **CVSS core** | 5.0 |
|
|
| **FOFA Query** (click to view the results directly)| [header="Server: Netgenie" \|\| banner="Server: Netgenie"](https://en.fofa.info/result?qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5ldGdlbmllIiB8fCBiYW5uZXI9IlNlcnZlcjogTmV0Z2VuaWUi) |
|
|
| **Number of assets affected** | 1566 |
|
|
| **Description** | With NetGenie, get support for all types of Internet connectivity, viz. VDSL2, ADSL2+, Cable Internet and 3G connection, along with excellent wireless range, high performance, Gigabit port and threat-free Wi-Fi over multiple devices. Get Internet activity reports of children at home along with security reports of your home network.The command center of this series of printers has admin/admin default password. |
|
|
| **Impact** | SOPHOS-Netgenie have default passwords. Attackers can use the default password admin/admin to log in to the system background without authorization, perform other sensitive operations, and obtain more sensitive information. |
|
|
|
|

|