A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote malicious user to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the malicious user to execute arbitrary code as the root user on the underlying operating system of the affected device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco rv110w_wireless-n_vpn_firewall_firmware |
||
cisco rv130_vpn_router_firmware |
||
cisco rv130w_wireless-n_multifunction_vpn_router_firmware |
||
cisco rv215w_wireless-n_vpn_router_firmware |
And who's that in the background? Just Oracle and its *cough* 443 bugs
Cisco has emitted 33 security bug fixes in its latest crop of software updates, five of those deemed critical. Those five critical vulnerabilities include two remote code execution bugs (CVE-2020-3323, CVE-2020-3321) – with no workarounds for either other than patching – and one each of authentication bypass (CVE-2020-3144), privilege escalation (CVE-2020-3140), and default credential (CVE-2020-3330) flaws. Affected devices include multiple RV-series routers, the RV110W series VPN Firewall, ...