Vulnerabilities > CVE-2019-1663 - Out-of-bounds Write vulnerability in Cisco Rv110W Firmware, Rv130W Firmware and Rv215W Firmware

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
cisco
CWE-787
critical
nessus
exploit available
metasploit

Summary

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.

Vulnerable Configurations

Part Description Count
OS
Cisco
85
Hardware
Cisco
3

Common Weakness Enumeration (CWE)

Exploit-Db

  • idEDB-ID:46961
    last seen2019-06-04
    modified2019-06-04
    published2019-06-04
    reporterExploit-DB
    sourcehttps://www.exploit-db.com/download/46961
    titleCisco RV130W 1.0.3.44 - Remote Stack Overflow
  • idEDB-ID:47348
    last seen2019-09-03
    modified2019-09-03
    published2019-09-03
    reporterExploit-DB
    sourcehttps://www.exploit-db.com/download/47348
    titleCisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit)
  • fileexploits/hardware/remote/46705.rb
    idEDB-ID:46705
    last seen2019-04-15
    modified2019-04-15
    platformhardware
    port
    published2019-04-15
    reporterExploit-DB
    sourcehttps://www.exploit-db.com/download/46705
    titleCisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
    typeremote

Metasploit

Nessus

NASL familyCISCO
NASL idCISCO-SA-20190227-RMI-CMD-EX.NASL
descriptionAccording to its self-reported version, the version of the Cisco Small Business Wireless-N VPN Router installed on the remote host is affected by a remote command execution vulnerability. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands as a high-privilege user.
last seen2020-06-01
modified2020-06-02
plugin id122483
published2019-02-27
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/122483
titleCisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability (cisco-sa-20190227-rmi-cmd-ex)

Packetstorm