The web-based management interface on Cisco RV110W devices with firmware prior to 1.2.1.7, RV130W devices with firmware prior to 1.0.3.16, and RV215W devices with firmware prior to 1.3.0.8 allows remote malicious users to execute arbitrary code as root via a crafted HTTP request, aka Bug ID CSCux82428.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco rv130w_wireless-n_multifunction_vpn_router_firmware 1.0.2.7 |
||
cisco rv130w_wireless-n_multifunction_vpn_router_firmware 1.0.1.3 |
||
cisco rv130w_wireless-n_multifunction_vpn_router_firmware 1.0.0.21 |
||
cisco rv215w_wireless-n_vpn_router_firmware 1.3.0.7 |
||
cisco rv215w_wireless-n_vpn_router_firmware 1.2.0.15 |
||
cisco rv215w_wireless-n_vpn_router_firmware 1.1.0.5 |
||
cisco rv215w_wireless-n_vpn_router_firmware 1.2.0.14 |
||
cisco rv215w_wireless-n_vpn_router_firmware 1.1.0.6 |
||
cisco rv110w_wireless-n_vpn_firewall_firmware 1.2.1.4 |
||
cisco rv110w_wireless-n_vpn_firewall_firmware 1.1.0.9 |
||
cisco rv110w_wireless-n_vpn_firewall_firmware 1.2.0.10 |
||
cisco rv110w_wireless-n_vpn_firewall_firmware 1.2.0.9 |