Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2014-0659OS Command Injection in Cisco Rvs4000 Firmware

Severity
10.0CRITICALNVD
EPSS
65.6%
top 1.50%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 12
Latest updateMay 17

Description

The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages3 packages

NVDcisco/rvs4000_firmware2.0.3.2+4
NVDcisco/wrvs4400n_firmware4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vx5m-4g29-886g: The Cisco WAP4410N access point with firmware through 22022-05-17
CVEList
CVE-2014-0659: The Cisco WAP4410N access point with firmware through 22014-01-12

💥Exploits & PoCs

1
Exploit-DB
SerComm Device - Remote Code Execution (Metasploit)2014-01-14

📋Vendor Advisories

1
Cisco
Undocumented Test Interface in Cisco Small Business Devices2014-01-11
CVE-2014-0659 — OS Command Injection in Cisco | cvebase