Hi everyone, Anyone hear of this new way to kill a WAP11, If you use the old Setup Program 1.05 you can change the AP ESSID, Channel Number, WEP Encryption >From being on the client side of the unit and it doesn't care you've entered a password Into the AP, because there's another one that's secret. Leave it up to Linksys to leave a huge hole In the security of the unit.
If you use setup 1.06, it will ask you for the password. But good is this if the old program Will just let you reprogram the access point what ever you want. I went war driving and sure enough, found a access point open and ran the program, it found the access point, told me everything, mac address, ip, name... I just changed the channel and send okay And away it went, and presto the AP came backup on a different channel... The AP even had WEP turned on. This is a huge security flaw and I want linksys to fix it, but I think I will see pigs fly for About 2 months before they get around to fixing this one -- general wireless list, a bawug thing <http://www.bawug.org/> [un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless
