Lucene search

K
ciscoCiscoCISCO-SA-CODE-EXEC-WH3BNFB
HistoryJul 15, 2020 - 4:00 p.m.

Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability

2020-07-1516:00:00
tools.cisco.com
7

0.005 Low

EPSS

Percentile

77.3%

A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.

The vulnerability is due to improper validation of user-supplied input data by the web-based management interface. An attacker could exploit this vulnerability by sending crafted requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-code-exec-wH3BNFb [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-code-exec-wH3BNFb”]

Affected configurations

Vulners
Node
ciscorv110w_wireless-n_vpn_firewallMatchany
OR
ciscorv215w_wireless-n_vpn_routerMatchany
OR
ciscorv110w_wireless-n_vpn_firewallMatchany
OR
ciscorv215w_wireless-n_vpn_routerMatchany

0.005 Low

EPSS

Percentile

77.3%

Related for CISCO-SA-CODE-EXEC-WH3BNFB