Cisco.RV.Series.Devices.SSL.VPN.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection vulnerability in Cisco RV320/RV325 routers.
The vulnerability is due to insufficient sanitizing of user supplied inputs. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target device. Successful exploitation could result in arbitrary command execution with privileges of the root user, via a crafted HTTP request.
Affected Products
RV340 Dual WAN Gigabit VPN Routers
RV340W Dual WAN Gigabit Wireless-AC VPN Routers
RV345 Dual WAN Gigabit VPN Routers
RV345P Dual WAN Gigabit POE VPN Routers
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's advisory :
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |
Version Updates
| Date | Version | Status | Detail |
|---|---|---|---|
| 2024-07-23 | 28.831 |
Modified
|
Name:Cisco. RV. Series. Routers. SSL. VPN. Command. Injection:Cisco. RV. Series. Devices. SSL. VPN. Command. Injection |
| 2024-06-05 | 28.801 |
Modified
|
Name:Cisco. RV340. Routers. Command. Injection:Cisco. RV. Series. Routers. SSL. VPN. Command. Injection |
| 2022-05-25 | 20.321 |
Modified
|
Sig Added |
| 2022-03-29 | 20.284 |
Modified
|
Sig Added |
| 2022-02-23 | 19.264 |
Modified
|
Default_action:pass:drop |
| 2022-02-14 | 19.259 |
New
|