This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Cisco RV340 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of POST request parameters provided to the upload.cgi endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the www-data user.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15883 is considered high due to the potential for privilege escalation.
To fix ZDI-CAN-15883, you should update the Cisco RV340 router firmware to the latest version provided by Cisco.
ZDI-CAN-15883 affects installations of Cisco RV340 routers that have the vulnerable firmware version.
ZDI-CAN-15883 cannot be exploited remotely as it requires network adjacency for attack.
Yes, authentication is required to exploit ZDI-CAN-15883, but the existing mechanism can be bypassed.