Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco rv132w firmware 1.0.1.14 |
||
cisco rv132w firmware 1.0.3.20 |
||
cisco rv134w firmware 1.0.1.14 |
||
cisco rv134w firmware 1.0.3.20 |
||
cisco rv160 firmware 1.0.1.14 |
||
cisco rv160 firmware 1.0.3.20 |
||
cisco rv160w firmware 1.0.1.14 |
||
cisco rv160w firmware 1.0.3.20 |
||
cisco rv260 firmware 1.0.1.14 |
||
cisco rv260 firmware 1.0.3.20 |
||
cisco rv260p firmware 1.0.1.14 |
||
cisco rv260p firmware 1.0.3.20 |
||
cisco rv260w firmware 1.0.1.14 |
||
cisco rv260w firmware 1.0.3.20 |
||
cisco rv340 firmware 1.0.1.14 |
||
cisco rv340 firmware 1.0.3.20 |
||
cisco rv340w firmware 1.0.1.14 |
||
cisco rv340w firmware 1.0.3.20 |
||
cisco rv345 firmware 1.0.1.14 |
||
cisco rv345 firmware 1.0.3.20 |
||
cisco rv345p firmware 1.0.1.14 |
||
cisco rv345p firmware 1.0.3.20 |