vendor:
Reaver
by:
cheffner@tacnetsol.com
7.8
CVSS
HIGH
WiFi Protected Setup Exploit
287
CWE
Product Name: Reaver
Affected Version From: All 802.11 access points implementing WiFi Protected Setup and have it enabled.
Affected Version To: All 802.11 access points implementing WiFi Protected Setup and have it enabled.
Patch Exists: No
Related CWE: No CVE US-CERT VU#723755
CPE: a:tacnetsol:reaver
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Access points from Linksys, Cisco, D-Link, TP-Link, Trendnet, and others.
2011
Reaver WiFi Protected Setup Exploit
Reaver is a tool to exploit a security hole in wireless routers that use WPS (WiFi Protected Setup). It is designed to brute force the PIN in order to recover the WPA/WPA2 passphrase. It is possible to use Reaver to attack access points from Linksys, Cisco, D-Link, TP-Link, Trendnet, and others.
Mitigation:
Disable WPS on the router and use a strong passphrase for the wireless network.