Lucene search

K
ciscoCiscoCISCO-SA-CODE-EXEC-WH3BNFB
HistoryJul 15, 2020 - 4:00 p.m.

Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability

2020-07-1516:00:00
tools.cisco.com
8
cisco
rv110w
rv215w
routers
arbitrary code execution
vulnerability
web-based management interface
remote attacker
software updates.

EPSS

0.005

Percentile

77.3%

A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.

The vulnerability is due to improper validation of user-supplied input data by the web-based management interface. An attacker could exploit this vulnerability by sending crafted requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-code-exec-wH3BNFb [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-code-exec-wH3BNFb”]

Affected configurations

Vulners
Node
ciscorv110w_wireless-n_vpn_firewall_firmwareMatchany
OR
ciscorv215w_wireless-n_vpn_router_firmwareMatchany
OR
ciscorv110w_wireless-n_vpn_firewall_firmwareMatchany
OR
ciscorv215w_wireless-n_vpn_router_firmwareMatchany
VendorProductVersionCPE
ciscorv110w_wireless-n_vpn_firewall_firmwareanycpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:any:*:*:*:*:*:*:*
ciscorv215w_wireless-n_vpn_router_firmwareanycpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:any:*:*:*:*:*:*:*

EPSS

0.005

Percentile

77.3%

Related for CISCO-SA-CODE-EXEC-WH3BNFB