Home | Blog | Software | Reviews and Features | Forum | Help | Donate | About us

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • September 26, 2016, 07:12:41 PM
  • Proudly celebrating 10 years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: Security: Seagate Wireless HDD Undocumented Accessible Telnet Services  (Read 1341 times)


  • Honorary Member
  • Joined in 2008
  • **
  • Posts: 2,841
    • View Profile
    • Donate to Member
Seagate wireless hard-drives provides undocumented Telnet services accessible by using the default credentials of 'root' as username and the default password.

via https://www.kb.cert.org/vuls/id/903500 and http://www.theregist..._poisoned_purloined/

FWIW, other vulnerabilities surfaced too (see links).

IIUC, this type of device has been mentioned in a few threads over the years...hence the post.


  • Charter Member
  • Joined in 2006
  • ***
  • Posts: 7,642
    • View Profile
    • The Blog of Deozaan
    • Read more about this member.
    • Donate to Member
Re: Security: Seagate Wireless HDD Undocumented Accessible Telnet Services
« Reply #1 on: September 08, 2015, 01:42:41 PM »
Yikes! Thanks for posting.