Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7r42-ppxw-235f

Опубликовано: 17 июл. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.

This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device.

A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.

This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device.

EPSS

Процентиль: 68%
0.00562
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-130

Связанные уязвимости

CVSS3: 6.5
nvd
больше 1 года назад

A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device.

CVSS3: 6.5
fstec
больше 1 года назад

Уязвимость модуля загрузки микропрограммного обеспечения маршрутизаторов Cisco RV340 и RV345 Dual WAN Gigabit VPN связана с неправильными проверками границ при обработке HTTP-запросов, позволяющая нарушителю выполнить произвольный код с root-привилегиями

EPSS

Процентиль: 68%
0.00562
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-130