Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qp8-g498-pjrc

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability in the web-based management interface of Cisco Small Business RV110W and RV215W Series Routers could allow an unauthenticated, remote attacker to download sensitive information from the device, which could include the device configuration. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing a specific URI on the web-based management interface of the router, but only after any valid user has opened a specific file on the device since the last reboot. A successful exploit would allow the attacker to view sensitive information, which should be restricted.

A vulnerability in the web-based management interface of Cisco Small Business RV110W and RV215W Series Routers could allow an unauthenticated, remote attacker to download sensitive information from the device, which could include the device configuration. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing a specific URI on the web-based management interface of the router, but only after any valid user has opened a specific file on the device since the last reboot. A successful exploit would allow the attacker to view sensitive information, which should be restricted.

EPSS

Процентиль: 56%
0.00336
Низкий

Связанные уязвимости

CVSS3: 5.9
nvd
больше 5 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV110W and RV215W Series Routers could allow an unauthenticated, remote attacker to download sensitive information from the device, which could include the device configuration. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing a specific URI on the web-based management interface of the router, but only after any valid user has opened a specific file on the device since the last reboot. A successful exploit would allow the attacker to view sensitive information, which should be restricted.

CVSS3: 5.9
fstec
больше 5 лет назад

Уязвимость веб-интерфейса управления межсетевого экрана Cisco RV110W Wireless-N VPN Firewall и микропрограммного обеспечения маршрутизатора Cisco RV215W Wireless-N VPN Router, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 56%
0.00336
Низкий