First published: Wed Sep 06 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.This vulnerability is due to improper validation of requests that are
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV110W Wireless-N VPN Firewall | ||
Cisco Small Business RV130 | ||
Cisco Small Business RV130W | ||
Cisco Small Business RV215W |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sb-rv-stack-SHYv2f5N is considered critical due to the potential for remote code execution.
To fix cisco-sa-sb-rv-stack-SHYv2f5N, update your affected Cisco routers to the latest firmware version provided by Cisco.
The devices affected by cisco-sa-sb-rv-stack-SHYv2f5N include Cisco Small Business RV110W, RV130, RV130W, and RV215W routers.
cisco-sa-sb-rv-stack-SHYv2f5N is caused by improper validation of requests in the web-based management interface.
Yes, cisco-sa-sb-rv-stack-SHYv2f5N can be exploited by an authenticated remote attacker to execute arbitrary code.