Vulnerabilites related to cisco - rv_series_router_firmware
Vulnerability from fkie_nvd
Published
2016-01-27 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv016_multi-wan_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "217831DB-FC07-443B-B969-2513ACE0C0AA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv042_dual_wan_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "87905EBD-2C32-41C7-933E-168B1A5941F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "0008DDD6-A6A5-46A2-B9A0-1DC807E29E02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv082_dual_wan_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3C2-8CD6-416D-80C2-3ECBB941DA55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:*:*:*:*:*:*:*:*", matchCriteriaId: "F95AABA7-ADCF-474B-A1AD-E55EFC09CF2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv120w_wireless-n_vpn_firewall:*:*:*:*:*:*:*:*", matchCriteriaId: "B3562EAC-7DD9-4D7E-8A54-577FAEDFD42B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv130_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "0A7C79FC-EC93-4832-85EC-E7D5672A7DF4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "4993AC7B-5E6F-4DB5-90D8-3181148BC7B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv180_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "8C656EE6-510D-4530-947E-6C1DE46EBC68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv180w_wireless-n_multifunction_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "8A68C4AD-0FB1-45FE-BD04-C3DC8A716F3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "175F8546-DBBB-4C34-9B9A-A39A6E70F2AF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv220w_wireless_network_security_firewall:*:*:*:*:*:*:*:*", matchCriteriaId: "5DD07AB5-E9DA-463F-B017-7A10FD8C2878", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv320_dual_gigabit_wan_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "40BE4E08-761E-44B1-923C-8CAF3EA1B812", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv320_dual_gigabit_wan_wf_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "22E350F7-5E72-4749-BBFE-021A3B838105", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv325_dual_gigabit_wan_wf_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "DE38F76A-20EB-4A00-A84D-F5F262E7A1AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rv325_dual_wan_gigabit_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "57228295-609D-4939-9FEF-71EFE6FFEAB6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rvl200_4-port_ssl_ipsec_vpn_router:*:*:*:*:*:*:*:*", matchCriteriaId: "F4558947-E413-4283-959A-B7C854BCECE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:rvs4000_4-port_gigabit_security_router_-_vpn:*:*:*:*:*:*:*:*", matchCriteriaId: "54D7930A-EC68-4518-BA88-529A3D4F0919", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:wrv200_wireless-g_vpn_router_-_rangebooster:*:*:*:*:*:*:*:*", matchCriteriaId: "D22C7E67-0F47-416F-80A5-D218C655D275", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:wrv210_wireless-g_vpn_router_-_rangebooster:*:*:*:*:*:*:*:*", matchCriteriaId: "7618CAE2-22D2-44B1-8FE8-F29101B62D57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:wrvs4400n_wireless-n_gigabit_security_router_-_vpn_v2.0:*:*:*:*:*:*:*:*", matchCriteriaId: "D0954EAD-6830-499E-BCE7-4F0FE1DDFE24", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.0.2:*:*:*:*:*:*:*", matchCriteriaId: "82E9DB28-1575-415C-BE18-9ADFD6BA66D5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.0.30:*:*:*:*:*:*:*", matchCriteriaId: "1AE98C62-84E0-435F-A376-984B1819B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.1.9:*:*:*:*:*:*:*", matchCriteriaId: "EBC77F08-1A4A-46AC-8359-5B20BAA9989B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.2.6:*:*:*:*:*:*:*", matchCriteriaId: "FE637ED7-943B-45A3-A0B3-EEAE02A96693", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.3.10:*:*:*:*:*:*:*", matchCriteriaId: "AA64F9F9-6843-4A74-8DC4-692B8A7E8394", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.4.10:*:*:*:*:*:*:*", matchCriteriaId: "95D5F5BE-8A32-415A-A686-5221C42EFD8B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.4.14:*:*:*:*:*:*:*", matchCriteriaId: "DCCDA0D3-AF8C-4EC2-8DC8-64322452C697", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.5.6:*:*:*:*:*:*:*", matchCriteriaId: "CF064F34-25A3-474E-BCA8-BC135FA4B834", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.5.8:*:*:*:*:*:*:*", matchCriteriaId: "1DEC997B-96CF-43E6-98C8-D6E469CA471D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.0.6.6:*:*:*:*:*:*:*", matchCriteriaId: "9B6AD360-866C-4E63-BA54-EAF697560D07", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.1.0.9:*:*:*:*:*:*:*", matchCriteriaId: "A0B5DF7C-99D2-4CF9-A0AD-8D6BE5780CA7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv_series_router_firmware:1.2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F60788C6-2130-4561-B1C8-72B138F2E9B7", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", matchCriteriaId: "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574.", }, { lang: "es", value: "Vulnerabilidad de inyección SQL en la interfaz de gestión basada en web en dispositivos Cisco RV220W permite a atacantes remotos ejecutar comandos SQL arbitrarios a través de una cabecera manipulada en una petición HTTP, también conocida como Bug ID CSCuv29574.", }, ], id: "CVE-2015-6319", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-01-27T22:59:00.100", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220", }, { source: "psirt@cisco.com", url: "http://www.securitytracker.com/id/1034830", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1034830", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-89", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2015-6319
Vulnerability from cvelistv5
Published
2016-01-27 22:00
Modified
2024-08-06 07:15
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034830 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220 | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T07:15:13.307Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1034830", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034830", }, { name: "20160127 Cisco RV220W Management Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-27T00:00:00", descriptions: [ { lang: "en", value: "SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "1034830", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034830", }, { name: "20160127 Cisco RV220W Management Authentication Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2015-6319", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1034830", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034830", }, { name: "20160127 Cisco RV220W Management Authentication Bypass Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2015-6319", datePublished: "2016-01-27T22:00:00", dateReserved: "2015-08-17T00:00:00", dateUpdated: "2024-08-06T07:15:13.307Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }