The Cisco WAP4410N access point with firmware up to and including 2.0.6.1, WRVS4400N router with firmware 1.x up to and including 1.1.13 and 2.x up to and including 2.0.2.1, and RVS4000 router with firmware up to and including 2.0.3.2 allow remote malicious users to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco rvs4000_firmware 2.0.2.7 |
||
cisco rvs4000_firmware 2.0.0.3 |
||
cisco rvs4000_firmware |
||
cisco rvs4000_firmware 1.3.3.5 |
||
cisco rvs4000_firmware 1.3.2.0 |
||
cisco rvs4000 - |
||
cisco wrvs4400n_firmware 2.0.2.1 |
||
cisco wrvs4400n_firmware 2.0.1.3 |
||
cisco wrvs4400n_firmware 1.1.13 |
||
cisco wrvs4400n_firmware 1.1.03 |
||
cisco wrvs4400n - |
||
cisco wap4410n_firmware 2.0.2.1 |
||
cisco wap4410n_firmware |
||
cisco wap4410n_firmware 2.0.4.2 |
||
cisco wap4410n_firmware 2.0.3.3 |
||
cisco wap4410n - |