Логотип exploitDog
bind:CVE-2020-3332
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3332

Количество 3

Количество 3

nvd логотип

CVE-2020-3332

больше 5 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fh59-cj56-8q9p

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.

EPSS: Низкий
fstec логотип

BDU:2020-03414

больше 5 лет назад

Уязвимость веб-интерфейса управления межсетевого экрана Cisco RV110W Wireless-N VPN Firewall, маршрутизаторов Cisco RV130 VPN Router, Cisco RV130W Wireless-N Multifunction VPN Router, Cisco RV215W Wireless-N VPN Router, позволяющая нарушителю выполнить произвольные команды операционной системы

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3332

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.

CVSS3: 8.8
2%
Низкий
больше 5 лет назад
github логотип
GHSA-fh59-cj56-8q9p

A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.

2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-03414

Уязвимость веб-интерфейса управления межсетевого экрана Cisco RV110W Wireless-N VPN Firewall, маршрутизаторов Cisco RV130 VPN Router, Cisco RV130W Wireless-N Multifunction VPN Router, Cisco RV215W Wireless-N VPN Router, позволяющая нарушителю выполнить произвольные команды операционной системы

CVSS3: 8.1
2%
Низкий
больше 5 лет назад

Уязвимостей на страницу