First published: Sun Jun 19 2016(Updated: )
The web-based management interface on Cisco RV110W devices with firmware before 1.2.1.7, RV130W devices with firmware before 1.0.3.16, and RV215W devices with firmware before 1.3.0.8 allows remote attackers to execute arbitrary code as root via a crafted HTTP request, aka Bug ID CSCux82428.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Rv130w Wireless-n Multifunction Vpn Router | ||
Cisco Rv130w Wireless-n Multifunction Vpn Router Firmware | =1.0.0.21 | |
Cisco Rv130w Wireless-n Multifunction Vpn Router Firmware | =1.0.1.3 | |
Cisco Rv130w Wireless-n Multifunction Vpn Router Firmware | =1.0.2.7 | |
Cisco RV215W Wireless-N VPN Router | ||
Cisco Rv215w Wireless-n Vpn Router Firmware | =1.1.0.5 | |
Cisco Rv215w Wireless-n Vpn Router Firmware | =1.1.0.6 | |
Cisco Rv215w Wireless-n Vpn Router Firmware | =1.2.0.14 | |
Cisco Rv215w Wireless-n Vpn Router Firmware | =1.2.0.15 | |
Cisco Rv215w Wireless-n Vpn Router Firmware | =1.3.0.7 | |
Cisco RV110W Wireless-N VPN Firewall | ||
Cisco Rv110w Wireless-n Vpn Firewall Firmware | =1.1.0.9 | |
Cisco Rv110w Wireless-n Vpn Firewall Firmware | =1.2.0.9 | |
Cisco Rv110w Wireless-n Vpn Firewall Firmware | =1.2.0.10 | |
Cisco Rv110w Wireless-n Vpn Firewall Firmware | =1.2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.