Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15271

Опубликовано: 26 нояб. 2019
Источник: nvd
CVSS3: 8.8
CVSS3: 8.8
CVSS2: 9
EPSS Низкий

Описание

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:rv016_multi-wan_vpn_firmware:*:*:*:*:*:*:*:*
Версия до 4.2.3.10 (исключая)
cpe:2.3:h:cisco:rv016_multi-wan_vpn:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:rv042_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*
Версия до 4.2.3.10 (исключая)
cpe:2.3:h:cisco:rv042_dual_wan_vpn:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_firmware:*:*:*:*:*:*:*:*
Версия до 4.2.3.10 (исключая)
cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:cisco:rv082_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*
Версия до 4.2.3.10 (исключая)
cpe:2.3:h:cisco:rv082_dual_wan_vpn:-:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05878
Низкий

8.8 High

CVSS3

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-502
CWE-502

Связанные уязвимости

CVSS3: 8.8
github
больше 3 лет назад

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

CVSS3: 8.8
fstec
больше 6 лет назад

Уязвимость микропрограммного обеспечения маршрутизаторов Cisco Small Business RV016, Cisco Small Business RV042, Cisco Small Business RV042G и Cisco Small Business RV082 позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 90%
0.05878
Низкий

8.8 High

CVSS3

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-502
CWE-502