10
CVSSv2

CVE-2014-0659

Published: 12/01/2014 Updated: 29/08/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Cisco WAP4410N access point with firmware up to and including 2.0.6.1, WRVS4400N router with firmware 1.x up to and including 1.1.13 and 2.x up to and including 2.0.2.1, and RVS4000 router with firmware up to and including 2.0.3.2 allow remote malicious users to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco rvs4000_firmware 2.0.2.7

cisco rvs4000_firmware 2.0.0.3

cisco rvs4000_firmware

cisco rvs4000_firmware 1.3.3.5

cisco rvs4000_firmware 1.3.2.0

cisco rvs4000 -

cisco wrvs4400n_firmware 2.0.2.1

cisco wrvs4400n_firmware 2.0.1.3

cisco wrvs4400n_firmware 1.1.13

cisco wrvs4400n_firmware 1.1.03

cisco wrvs4400n -

cisco wap4410n_firmware 2.0.2.1

cisco wap4410n_firmware

cisco wap4410n_firmware 2.0.4.2

cisco wap4410n_firmware 2.0.3.3

cisco wap4410n -

Vendor Advisories

A vulnerability in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit Security Router could allow an unauthenticated, remote attacker to gain root-level access to an affected device Note: Additional research performed by Mr Eloi Vanderbeken during April 2014 seems ...

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::CmdStagerEcho def initialize(info={}) super(update_info(inf ...