漏洞描述 Cisco RV132W ADSL2+Wireless-N VPN路由器和Cisco RV134W VDSL2 Wireless ACVPN路由器的web界面中存在漏洞,使得未经验证的远程攻击者能够查看受影响设备的配置参数,这可能导致机密信息的泄露。其中有账户名和base64编码的密码泄露
相关漏洞推荐 Cisco Secure Firewall Management Center和Cisco Secure Firewall Threat Defense 操作系统命令注入漏洞 POC CVE-2001-0537: Cisco IOS HTTP Configuration - Authentication Bypass POC CVE-2009-1558: Cisco Linksys WVC54GCA 1.00R22/1.00R24 - Local File Inclusion POC CVE-2011-3315: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal POC CVE-2013-5528: Cisco Unified Communications Manager 7/8/9 - Directory Traversal POC CVE-2018-0127: Cisco RV132W/RV134W Router - Information Disclosure POC CVE-2018-0296: Cisco ASA - Local File Inclusion POC CVE-2019-1653: Cisco Small Business WAN VPN Routers - Sensitive Information Disclosure POC CVE-2019-1821: Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager - Remote Code Execution POC CVE-2019-1898: Cisco RV110W RV130W RV215W Router - Information leakage POC CVE-2019-1943: Cisco Small Business 200,300 and 500 Series Switches - Open Redirect POC CVE-2020-16139: Cisco Unified IP Conference Station 7937G - Denial-of-Service POC CVE-2020-26073: Cisco SD-WAN vManage Software - Local File Inclusion