First published: Fri Oct 05 2018(Updated: )
A vulnerability in the web framework code for Cisco RV180W Wireless-N Multifunction VPN Router and Small Business RV Series RV220W Wireless Network Security Firewall could allow an unauthenticated, remote attacker to conduct a directory path traversal attack on a targeted device. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV180 Firmware | ||
Cisco RV180W VPN Router | ||
Cisco RV220W | ||
Cisco RV220W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0405 has a high severity rating due to the potential for unauthenticated remote attackers to exploit the vulnerability.
CVE-2018-0405 affects the Cisco RV180W Wireless-N Multifunction VPN Router and RV220W Wireless Network Security Firewall.
To fix CVE-2018-0405, ensure that the firmware for the affected Cisco RV180W and RV220W devices is updated to a version that mitigates this vulnerability.
Yes, CVE-2018-0405 can be exploited by unauthenticated remote attackers without physical access to the devices.
CVE-2018-0405 can facilitate a directory path traversal attack, allowing attackers to access restricted directories on the device.