This vulnerability allows local attackers to escalate privileges on affected installations of Cisco RV340 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within confd_cli. The issue results from executing user commands at an unnecessarily high privilege level. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-412 is classified as high due to its potential to allow local privilege escalation.
To fix ZDI-22-412, apply the latest firmware updates provided by Cisco for RV340 routers.
ZDI-22-412 affects installations of Cisco RV340 routers that have not been updated to the latest firmware.
No, ZDI-22-412 requires local access to the affected device to exploit the vulnerability.
The potential impacts of ZDI-22-412 include unauthorized access and control over the router by escalating privileges.