CVE-2011-1646
Published May 31, 2011
Last updated 13 years ago
Overview
- Description
- The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote authenticated users to execute arbitrary commands via the (1) ping test parameter or (2) traceroute test parameter, aka Bug ID CSCtn23871.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rvs4000:1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDEB65FB-54C5-4574-9208-F3E3EE823B96" }, { "criteria": "cpe:2.3:h:cisco:rvs4000:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7E4042-1F62-4DF7-A624-2F492F792937" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5363CFAF-439E-488C-9E97-BE04D80A4F9D" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096FB511-0E5D-46B6-827B-EAB242E015EA" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "567C5658-57F0-4BBA-9849-9A77504102FC" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2596081A-DFA3-4006-9B7C-EE3A29ED0341" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrvs4400n:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D4BF4B-0360-4A3B-8843-1D5E84CA948E" }, { "criteria": "cpe:2.3:h:cisco:wrvs4400n:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C01433D-F43E-4574-BC04-1F0C060BBFC4" }, { "criteria": "cpe:2.3:h:cisco:wrvs4400n:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C11E2E-B910-45EC-A8FA-6BAAFFD26ED3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C754BA1B-7DEC-49F4-835F-1EDA9289E19D" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A0606AC-B349-411A-8D45-213A60FCFD08" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1CE7344-400B-4E2F-B9DF-C2B0BB74B080" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEB82F7E-A77E-400A-B894-3207026826C9" } ], "operator": "OR" } ], "operator": "AND" } ]