CVE-2014-0659

N/A Unknown
Published: January 12, 2014 Modified: April 29, 2026
View on NVD

Description

The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/64776
Source: psirt@cisco.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029579
Source: psirt@cisco.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029580
Source: psirt@cisco.com
Third Party Advisory VDB Entry
https://github.com/elvanderb/TCP-32764
Source: psirt@cisco.com
Issue Tracking Patch
http://secunia.com/advisories/56292
Source: af854a3a-2127-422b-91ae-364da2661108
http://tools.cisco.com/security/center/viewAlert.x?alertId=32381
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/64776
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029579
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029580
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90233
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/elvanderb/TCP-32764
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch

16 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
65.6%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cisco