Multiple vulnerabilities in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130 VPN Router, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router could allow an authenticated, remote malicious user to execute arbitrary code on an affected device. The vulnerabilities are due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit these vulnerabilities by sending malicious HTTP requests to a targeted device. A successful exploit could allow the malicious user to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco rv110w_wireless-n_vpn_firewall_firmware |
||
cisco rv130_firmware |
||
cisco rv130w_firmware |
||
cisco rv215w_firmware |
And who's that in the background? Just Oracle and its *cough* 443 bugs
Cisco has emitted 33 security bug fixes in its latest crop of software updates, five of those deemed critical. Those five critical vulnerabilities include two remote code execution bugs (CVE-2020-3323, CVE-2020-3321) – with no workarounds for either other than patching – and one each of authentication bypass (CVE-2020-3144), privilege escalation (CVE-2020-3140), and default credential (CVE-2020-3330) flaws. Affected devices include multiple RV-series routers, the RV110W series VPN Firewall, ...