CVE-2014-0659 (CNNVD-201401-166)
中文标题:
Cisco WAP4410N/WRVS4400N/RVS4000 操作系统命令注入漏洞
英文标题:
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x th...
漏洞描述
中文描述:
Cisco WAP4410N、WRVS4400N和RVS4000都是美国思科(Cisco)公司的产品。WAP4410N是一款无线接入器;WRVS4400N是一款企业级无线路由器;RVS4000是一款企业级千兆宽带路由器。 使用2.0.6.1及之前的版本固件的Cisco WAP4410N Access Point,使用1.x至1.1.13版本和2.x至2.0.2.1版本固件的WRVS4400N路由器,使用2.0.3.2及之前的版本固件的RVS4000路由器中存在安全漏洞。远程攻击者可绕过发送请求到TCP 32764端口上的测试接口利用该漏洞读取证书和配置数据,执行任意命令。
英文描述:
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | rvs4000_firmware | * | - | - |
cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*
|
| cisco | rvs4000_firmware | 1.3.2.0 | - | - |
cpe:2.3:o:cisco:rvs4000_firmware:1.3.2.0:*:*:*:*:*:*:*
|
| cisco | rvs4000_firmware | 1.3.3.5 | - | - |
cpe:2.3:o:cisco:rvs4000_firmware:1.3.3.5:*:*:*:*:*:*:*
|
| cisco | rvs4000_firmware | 2.0.0.3 | - | - |
cpe:2.3:o:cisco:rvs4000_firmware:2.0.0.3:*:*:*:*:*:*:*
|
| cisco | rvs4000_firmware | 2.0.2.7 | - | - |
cpe:2.3:o:cisco:rvs4000_firmware:2.0.2.7:*:*:*:*:*:*:*
|
| cisco | rvs4000 | - | - | - |
cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*
|
| cisco | wrvs4400n_firmware | 1.1.03 | - | - |
cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.03:*:*:*:*:*:*:*
|
| cisco | wrvs4400n_firmware | 1.1.13 | - | - |
cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.13:*:*:*:*:*:*:*
|
| cisco | wrvs4400n_firmware | 2.0.1.3 | - | - |
cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.1.3:*:*:*:*:*:*:*
|
| cisco | wrvs4400n_firmware | 2.0.2.1 | - | - |
cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.2.1:*:*:*:*:*:*:*
|
| cisco | wrvs4400n | - | - | - |
cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*
|
| cisco | wap4410n_firmware | * | - | - |
cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*
|
| cisco | wap4410n_firmware | 2.0.2.1 | - | - |
cpe:2.3:o:cisco:wap4410n_firmware:2.0.2.1:*:*:*:*:*:*:*
|
| cisco | wap4410n_firmware | 2.0.3.3 | - | - |
cpe:2.3:o:cisco:wap4410n_firmware:2.0.3.3:*:*:*:*:*:*:*
|
| cisco | wap4410n_firmware | 2.0.4.2 | - | - |
cpe:2.3:o:cisco:wap4410n_firmware:2.0.4.2:*:*:*:*:*:*:*
|
| cisco | wap4410n | - | - | - |
cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2014-0659 |
2025-11-11 15:18:42 | 2025-11-11 07:33:43 |
| NVD | nvd_CVE-2014-0659 |
2025-11-11 14:54:31 | 2025-11-11 07:42:28 |
| CNNVD | cnnvd_CNNVD-201401-166 |
2025-11-11 15:09:25 | 2025-11-11 07:51:09 |
| EXPLOITDB | exploitdb_EDB-30915 |
2025-11-11 15:05:22 | 2025-11-11 08:25:47 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 8 -> 11
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201401-166
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 10.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 16
- data_sources: ['cve'] -> ['cve', 'nvd']