The Cisco WAP4410N access point with firmware up to and including 2.0.6.1, WRVS4400N router with firmware 1.x up to and including 1.1.13 and 2.x up to and including 2.0.2.1, and RVS4000 router with firmware up to and including 2.0.3.2 allow remote malicious users to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco rvs4000 firmware |
||
cisco rvs4000 firmware 1.3.2.0 |
||
cisco rvs4000 firmware 1.3.3.5 |
||
cisco rvs4000 firmware 2.0.0.3 |
||
cisco rvs4000 firmware 2.0.2.7 |
||
cisco rvs4000 - |
||
cisco wrvs4400n firmware 1.1.03 |
||
cisco wrvs4400n firmware 1.1.13 |
||
cisco wrvs4400n firmware 2.0.1.3 |
||
cisco wrvs4400n firmware 2.0.2.1 |
||
cisco wrvs4400n - |
||
cisco wap4410n firmware |
||
cisco wap4410n firmware 2.0.2.1 |
||
cisco wap4410n firmware 2.0.3.3 |
||
cisco wap4410n firmware 2.0.4.2 |
||
cisco wap4410n - |