Description
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
Published: 2014-01-12
Score: 10.0 Critical
EPSS: 65.6% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Cisco Rvs4000 Rvs4000 Firmware Wap4410n Wap4410n Firmware Wrvs4400n Wrvs4400n Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-06T09:20:19.839Z

Reserved: 2014-01-02T00:00:00.000Z

Link: CVE-2014-0659

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2014-01-12T18:34:55.957

Modified: 2026-04-29T01:13:23.040

Link: CVE-2014-0659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses