First published: Wed Jun 15 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges. Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-overflow-s2r82P9v
Credit: security researcher Puzhuo Liu IIECAS.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV110W Wireless-N VPN Firewall | ||
Cisco Small Business RV130 | ||
Cisco Small Business RV130W | ||
Cisco Small Business RV215W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sb-rv-overflow-s2r82P9v is high due to vulnerabilities that allow remote code execution and denial of service.
To fix cisco-sa-sb-rv-overflow-s2r82P9v, it's recommended to update the affected Cisco Small Business routers to the latest firmware provided by Cisco.
The affected devices include Cisco Small Business RV110W, RV130, RV130W, and RV215W routers.
cisco-sa-sb-rv-overflow-s2r82P9v allows unauthenticated remote attackers to execute arbitrary code or cause a device restart, leading to a denial of service.
No, authentication is not required to exploit cisco-sa-sb-rv-overflow-s2r82P9v, making it particularly dangerous.