First published: Wed Nov 03 2021(Updated: )
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-cmdinjection-Z5cWFdK
Credit: leetsun.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV Series Router Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sbrv-cmdinjection-Z5cWFdK is high due to the potential for remote command injection by authenticated attackers.
To fix cisco-sa-sbrv-cmdinjection-Z5cWFdK, update the firmware of affected Cisco Small Business RV Series Routers to the latest version provided by Cisco.
Users of certain Cisco Small Business RV Series Routers with administrative access are affected by cisco-sa-sbrv-cmdinjection-Z5cWFdK.
cisco-sa-sbrv-cmdinjection-Z5cWFdK enables authenticated attackers to inject and execute arbitrary commands on the router's operating system.
Yes, exploitation of cisco-sa-sbrv-cmdinjection-Z5cWFdK requires the attacker to have administrative privileges on the affected device.