First published: Fri Nov 07 2014(Updated: )
The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV120W firmware | <=1.0.5.8 | |
Cisco RV120W | ||
Cisco RV220W | <=1.0.5.8 | |
Cisco RV220W | ||
Cisco RV180W Firmware | <=1.0.3.10 | |
Cisco RV180W VPN Router | ||
Cisco RV180W VPN Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2177 has a severity rating that indicates it can lead to remote command execution by authenticated users.
To mitigate CVE-2014-2177, update the firmware of Cisco RV120W, RV220W, RV180, or RV180W devices to the latest version available.
CVE-2014-2177 affects Cisco RV120W, RV220W, RV180, and RV180W devices running specified vulnerable firmware versions.
CVE-2014-2177 can be exploited through crafted HTTP requests that allow arbitrary command execution.
Yes, exploitation of CVE-2014-2177 requires that the attacker is an authenticated user on the affected Cisco devices.