First published: Wed Jul 15 2020(Updated: )
Multiple vulnerabilities in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130 VPN Router, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router could allow an authenticated, remote attacker to execute arbitrary code on an affected device. The vulnerabilities are due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit these vulnerabilities by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. Cisco has released software updates that address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-m4FEEGWX
Credit: Quentin Kaiser for reporting these vulnerabilities.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W firmware | ||
Cisco RV130W Wireless-AC VPN Router | ||
Cisco RV130W firmware | ||
Cisco RV215W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-rv-rce-m4FEEGWX is high due to its potential to allow remote code execution.
To fix cisco-sa-rv-rce-m4FEEGWX, apply the latest firmware updates provided by Cisco for the affected devices.
cisco-sa-rv-rce-m4FEEGWX affects the Cisco RV110W, RV130, RV130W, and RV215W routers.
Yes, cisco-sa-rv-rce-m4FEEGWX can be exploited by an authenticated remote attacker.
cisco-sa-rv-rce-m4FEEGWX describes a remote code execution vulnerability in the web-based management interface.