Cisco.RV340.Routers.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection vulnerability in Cisco RV320/RV325 routers.
The vulnerability is due to insufficient sanitizing of user supplied inputs. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target device. Successful exploitation could result in arbitrary command execution with privileges of the root user, via a crafted HTTP request.
Affected Products
RV340 Dual WAN Gigabit VPN Routers
RV340W Dual WAN Gigabit Wireless-AC VPN Routers
RV345 Dual WAN Gigabit VPN Routers
RV345P Dual WAN Gigabit POE VPN Routers
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's advisory :
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2022-05-25 | 20.321 | Sig Added |
2022-03-29 | 20.284 | Sig Added |
2022-02-23 | 19.264 | Default_action:pass:drop |
2022-02-14 | 19.259 |