7.8
CWE
78
Advisory Published
Updated

CVE-2015-6396: OS Command Injection

First published: Mon Aug 08 2016(Updated: )

The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161, and CSCux73567.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco RV110W Wireless-N VPN Firewall Firmware
Cisco Small Business RV110W Wireless-N VPN Firewall
Cisco RV130W Wireless-N Multifunction VPN Router
Cisco RV130W Wireless-N Multifunction VPN Router
Silabs Wireless Smart Ubiquitous Network Linux Border Router Firmware
Cisco RV215W Wireless-N VPN Router Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2015-6396?

    CVE-2015-6396 is considered a high severity vulnerability due to its potential for unauthorized command execution.

  • How do I fix CVE-2015-6396?

    To fix CVE-2015-6396, update the firmware of affected Cisco RV110W, RV130W, or RV215W devices to the latest version that addresses this vulnerability.

  • What devices are affected by CVE-2015-6396?

    CVE-2015-6396 affects Cisco RV110W, RV130W, and RV215W devices running specific firmware versions.

  • Can CVE-2015-6396 be exploited remotely?

    CVE-2015-6396 requires local access for exploitation, making it a local vulnerability rather than a remote one.

  • What are the implications of CVE-2015-6396?

    The implications of CVE-2015-6396 include the potential for local users to execute arbitrary shell commands as an administrator, leading to further system compromise.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203