[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-0659Date: (C)2014-01-15   (M)2023-12-22


The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1029579
SECTRACK-1029580
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd
SECUNIA-56292
BID-64776
cisco-small-cve20140659-priv-esc(90233)
http://tools.cisco.com/security/center/viewAlert.x?alertId=32381
https://github.com/elvanderb/TCP-32764

CPE    14
cpe:/o:cisco:wrvs4400n_firmware:1.1.13
cpe:/o:cisco:wap4410n_firmware:2.0.2.1
cpe:/o:cisco:wrvs4400n_firmware:1.1.03
cpe:/o:cisco:rvs4000_firmware:1.3.3.5
...
CWE    1
CWE-78

© SecPod Technologies