Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-1287

Опубликовано: 18 мар. 2021
Источник: nvd
CVSS3: 7.2
CVSS2: 9
EPSS Низкий

Описание

A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:rv132w_firmware:*:*:*:*:*:*:*:*
Версия до 1.0.1.15 (исключая)
cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:rv134w_firmware:*:*:*:*:*:*:*:*
Версия до 1.0.1.21 (исключая)
cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*

EPSS

Процентиль: 59%
0.00379
Низкий

7.2 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-121

Связанные уязвимости

github
больше 3 лет назад

A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device.

CVSS3: 7.2
fstec
почти 5 лет назад

Уязвимость веб-интерфейса управления микропрограммного обеспечения VPN-маршрутизаторов Cisco RV132W ADSL2+ и Cisco RV134W VDSL2, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 59%
0.00379
Низкий

7.2 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-121