漏洞描述 Cisco RV132W ADSL2+Wireless-N VPN路由器和Cisco RV134W VDSL2 Wireless ACVPN路由器的web界面中存在漏洞,使得未经验证的远程攻击者能够查看受影响设备的配置参数,这可能导致机密信息的泄露。其中有账户名和base64编码的密码泄露
相关漏洞推荐 POC CVE-2024-20404: Cisco Finesse - Server-Side Request Forgery (SSRF) Cisco IOS XE Software 命令注入漏洞 Cisco Secure Firewall Adaptive Security Appliance 缓冲区溢出漏洞 (CVE-2025-20240) Cisco IOS XE Software Web UI反射型跨站脚本漏洞 (CVE-2025-20149)Cisco IOS和Cisco IOS XE软件CLI缓冲区溢出漏洞导致拒绝服务 (CVE-2025-20334)Cisco IOS XE HTTP API命令注入漏洞 Cisco IOS XR 访问控制错误漏洞 Cisco Secure Firewall Management Center和Cisco Secure Firewall Threat Defense 操作系统命令注入漏洞 (CVE-2025-20332)Cisco ISE权限验证漏洞允许修改配置描述 (CVE-2025-20331)Cisco ISE和Cisco ISE-PIC存储型跨站脚本漏洞 POC CVE-2001-0537: Cisco IOS HTTP Configuration - Authentication Bypass POC CVE-2009-1558: Cisco Linksys WVC54GCA 1.00R22/1.00R24 - Local File Inclusion POC CVE-2011-3315: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal