Summary
It was possible to poison the remote host routing tables through the RIP protocol.
An attacker may use this to hijack network connections.
Solution
use RIP-2 and implement authentication,
or use another routing protocol,
or disable the RIP listener if you don't need it.