First published: Wed Jul 15 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmd-shell-injection-9jOQn9Dy
Credit: Larryxi XDSEC
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Products | =RV130W Wireless-N Multifunction VPN Router<1.0.3.55>=RV110W Wireless-N VPN Firewall<=RV130 VPN Router<1.0.3.55 | 1.0.3.55 1.0.3.55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-cmd-shell-injection-9jOQn9Dy is high, as it allows remote attackers to execute arbitrary shell commands on affected devices.
To fix cisco-sa-cmd-shell-injection-9jOQn9Dy, update your Cisco RV110W, RV130, RV130W, or RV215W router to the latest firmware version.
The affected devices by cisco-sa-cmd-shell-injection-9jOQn9Dy include the Cisco RV110W, RV130, RV130W, and RV215W Series Routers.
cisco-sa-cmd-shell-injection-9jOQn9Dy can be exploited by authenticated attackers to inject and execute arbitrary shell commands.
Yes, authentication is required for an attacker to exploit the vulnerability described by cisco-sa-cmd-shell-injection-9jOQn9Dy.