This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco RV340 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-22-418 is rated with high severity, allowing remote code execution.
To fix ZDI-22-418, update your Cisco RV340 router firmware to the latest version recommended by Cisco.
ZDI-22-418 affects installations of Cisco RV340 routers.
No, ZDI-22-418 does not require authentication to be exploited by attackers.
ZDI-22-418 allows remote attackers to execute arbitrary code due to a vulnerability in firmware update handling.