CVE-2010-2363

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.

Date published : 2010-08-30

http://www.seil.jp/seilseries/security/2010/a00875.php

http://jvn.jp/en/jp/JVN12683004/index.html