CWE
119
Advisory Published

cisco-sa-code-exec-wH3BNFb: Cisco RV110W and RV215W Series Routers Arbitrary Code Execution Vulnerability

First published: Wed Jul 15 2020(Updated: )

A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input data by the web-based management interface. An attacker could exploit this vulnerability by sending crafted requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-code-exec-wH3BNFb

Credit: Larryxi XDSEC

Affected SoftwareAffected VersionHow to fix
Cisco Small Business RV110W Wireless-N VPN Firewall
Cisco RV215W Wireless-N VPN Router Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-code-exec-wH3BNFb?

    The severity of cisco-sa-code-exec-wH3BNFb is high due to the potential for remote code execution by unauthenticated attackers.

  • How do I fix cisco-sa-code-exec-wH3BNFb?

    To fix cisco-sa-code-exec-wH3BNFb, upgrade to the latest firmware version provided by Cisco for the affected devices.

  • Which devices are affected by cisco-sa-code-exec-wH3BNFb?

    The affected devices are Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router.

  • What exploits are possible with cisco-sa-code-exec-wH3BNFb?

    Exploiting cisco-sa-code-exec-wH3BNFb can allow an attacker to execute arbitrary code on the device, leading to unauthorized access and control.

  • Is user authentication required to exploit cisco-sa-code-exec-wH3BNFb?

    No, user authentication is not required to exploit cisco-sa-code-exec-wH3BNFb, making it particularly dangerous.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203