lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <40C26698.4090508@athensgroup.com>
From: jhg at athensgroup.com (James Garrison)
Subject: Re: Netgear WG602 Accesspoint vulnerability

CORRECTION - Firmware is 3.1RC5 not 2.0RC5 as I first stated

My WG602v2 with firmware 3.1RC5 does not appear to be vulnerable.
                          ^^^^^^

I cannot login with the super/5777364 combination.

Lupe Christoph wrote:

> On Thursday, 2004-06-03 at 19:35:22 +0200, Tom Knienieder wrote:
> 
> 
>>        Possibly vulnerable (not verified)
>>                WG602 with other Firmware Versions
>>                WG602v2

-- 
James Garrison                                Athens Group, Inc.
mailto:jhg@...ensgroup.com                    5608 Parkcrest Dr
http://www.athensgroup.com                    Austin, TX 78731
PGP: RSA=0x92E90A3B DH/DSS=0x498D331C         (512) 345-0600 x150




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ