Improper input validation in Cisco RV134W Wireless-N VPN Router and Cisco RV132W Wireless-N VPN Router - CVE-2018-0125

 

Improper input validation in Cisco RV134W Wireless-N VPN Router and Cisco RV132W Wireless-N VPN Router - CVE-2018-0125

Published: February 8, 2018 / Updated: March 25, 2022


Vulnerability identifier: #VU10423
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2018-0125
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vendor: Cisco Systems, Inc
Affected software:
Cisco RV134W Wireless-N VPN Router
Cisco RV132W Wireless-N VPN Router

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in the web interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers due to an incomplete input validation on user-controlled input in an HTTP request. A remote attacker can send a specially crafted HTTP request and cause the device to crash or execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.


How to mitigate CVE-2018-0125

Install update from vendor's website.

Sources