A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmd-shell-injection-9jOQn9Dy - Vendor Advisory |
Information
Published : 2020-07-16 18:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3332
Mitre link : CVE-2020-3332
CVE.ORG link : CVE-2020-3332
JSON object : View
Products Affected
cisco
- rv215w_wireless-n_vpn_router
- rv130w_wireless-n_multifunction_vpn_router_firmware
- rv130_vpn_router
- rv110w_wireless-n_vpn_firewall_firmware
- rv130_vpn_router_firmware
- rv215w_wireless-n_vpn_router_firmware
- rv130w_wireless-n_multifunction_vpn_router
- rv110w_wireless-n_vpn_firewall
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')