CVE-2014-0659 Information

Share on:

Description

The Cisco WAP4410N access point with firmware through 2.0.6.1 WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1 and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data and execute arbitrary commands via requests to the test interface on TCP port 32764 aka Bug IDs CSCum37566 CSCum43693 CSCum43700 and CSCum43685.

Reference

http://secunia.com/advisories/56292 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd http://tools.cisco.com/security/center/viewAlert.x?alertId=32381 http://www.securityfocus.com/bid/64776 http://www.securitytracker.com/id/1029579 http://www.securitytracker.com/id/1029580 https://exchange.xforce.ibmcloud.com/vulnerabilities/90233 https://github.com/elvanderb/TCP-32764