Networking giant Cisco has disclosed, but not yet patched, a LAN-based backdoor in several small business networking products. At attacker exploiting this vulnerability through the LAN interface could access user credentials for the administrator account of the device and the device configuration or issue arbitrary commands on the device with escalated privileges.
The affected products are:
- Cisco RVS4000 4-port Gigabit Security Router running firmware version 22.214.171.124 and prior
- Cisco WRVS4400N Wireless-N Gigabit Security Router hardware version 1.0 and 1.1 running firmware version 1.1.13 and prior
- Cisco WRVS4400N Wireless-N Gigabit Security Router hardware version 2.0 running firmware version 126.96.36.199 and prior
- Cisco WAP4410N Wireless-N Access Point running firmware version 188.8.131.52 and prior
Cisco says that "[N]o other Cisco products are currently known to be affected by these vulnerabilities."
The vulnerability results from "an undocumeted test interface in the TCP service listening on port 32764..." The vulnerability was disclosed by Eloi Vanderbeken on his github page, where he also provided exploit code.
Cisco plans to release fixed software for the affected devices by the end of January 2014. There are no known workarounds for the problem.
Note: These are Cisco-branded, not Linksys products. Cisco owned Linksys until March, 2013, but it is now owned by Belkin.