Default Credentials of WMT Server

Sooraj V Nair
Published on
16 Jun 2021

This vulnerability exists in WMT Playout Server’s Web Administrative Interface on Version 20.2.8 and Below, due to the presence of a default account that has a default password “pokon”. An attacker exploits this vulnerability by connecting an affected system using this default account. A successful exploit will help the attacker to gain read and write access to system data, including the configuration of affected devices.


An attacker will be able to obtain access to sensitive portions of the system and have administrative privileges to control the device.

Mitigation / Precaution

We recommend you to upgrade WMT Playout server to latest version.

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Sooraj V Nair
Sooraj V Nair
Cyber Security Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment