A vulnerability in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an authenticated, remote malicious user to perform a command injection attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious request to certain parts of the web management interface. To send the malicious request, the attacker needs a valid login session in the web management interface as a privilege level 15 user. Depending on the configuration of the affected switch, the malicious request must be sent via HTTP or HTTPS. A successful exploit could allow the malicious user to execute arbitrary shell commands with the privileges of the root user.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco sf-220-24_firmware |
||
cisco sf220-24p_firmware |
||
cisco sf220-48_firmware |
||
cisco sf220-48p_firmware |
||
cisco sg220-26_firmware |
||
cisco sg220-26p_firmware |
||
cisco sg220-28_firmware |
||
cisco sg220-28mp_firmware |
||
cisco sg220-50_firmware |
||
cisco sg220-50p_firmware |
||
cisco sg220-52_firmware |