This vulnerability allows local attackers to escalate privileges on affected installations of Cisco RV340 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the utility-ping-request script. The issue results from the creation of a temporary file with insecure permissions. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-420 is classified as a high-risk vulnerability due to its potential for privilege escalation.
To fix ZDI-22-420, you should update the firmware of affected Cisco RV340 routers to the latest version provided by Cisco.
ZDI-22-420 affects users of Cisco RV340 routers who have low-privileged code execution capabilities on their devices.
ZDI-22-420 can enable local attackers to escalate their privileges, potentially allowing them full control over the affected router.
ZDI-22-420 requires local exploitation, meaning an attacker must have access to run low-privileged code on the target Cisco RV340 router.