Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-3332

Опубликовано: 16 июл. 2020
Источник: nvd
CVSS3: 8.1
CVSS3: 8.8
CVSS2: 9
EPSS Низкий

Описание

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:*:*:*:*:*:*:*:*
Версия до 1.2.2.8 (исключая)
cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:rv130_vpn_router_firmware:*:*:*:*:*:*:*:*
Версия до 1.0.3.55 (исключая)
cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:*:*:*:*:*:*:*:*
Версия до 1.0.3.55 (исключая)
cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:*:*:*:*:*:*:*:*
Версия до 1.3.1.7 (исключая)
cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*

EPSS

Процентиль: 83%
0.01977
Низкий

8.1 High

CVSS3

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78
CWE-78

Связанные уязвимости

github
больше 3 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.

CVSS3: 8.1
fstec
больше 5 лет назад

Уязвимость веб-интерфейса управления межсетевого экрана Cisco RV110W Wireless-N VPN Firewall, маршрутизаторов Cisco RV130 VPN Router, Cisco RV130W Wireless-N Multifunction VPN Router, Cisco RV215W Wireless-N VPN Router, позволяющая нарушителю выполнить произвольные команды операционной системы

EPSS

Процентиль: 83%
0.01977
Низкий

8.1 High

CVSS3

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78
CWE-78