// For flags

CVE-2020-3293

Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.

Múltiples vulnerabilidades en la interfaz de administración basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podrían permitir a un atacante remoto autenticado con privilegios administrativos ejecutar código arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de límite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administración basada en web. Un atacante con privilegios administrativos que sean suficientes para iniciar sesión en la interfaz de administración basada en web podría explotar cada vulnerabilidad mediante el envío de peticiones diseñadas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotación con éxito podría permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar código arbitrario con privilegios root en el sistema operativo subyacente

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-06-18 CVE Published
  • 2024-04-06 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Rv016 Firmware
Search vendor "Cisco" for product "Rv016 Firmware"
<= 4.2.3.10
Search vendor "Cisco" for product "Rv016 Firmware" and version " <= 4.2.3.10"
-
Affected
in Cisco
Search vendor "Cisco"
Rv016
Search vendor "Cisco" for product "Rv016"
--
Safe
Cisco
Search vendor "Cisco"
Rv042 Firmware
Search vendor "Cisco" for product "Rv042 Firmware"
<= 4.2.3.10
Search vendor "Cisco" for product "Rv042 Firmware" and version " <= 4.2.3.10"
-
Affected
in Cisco
Search vendor "Cisco"
Rv042
Search vendor "Cisco" for product "Rv042"
--
Safe
Cisco
Search vendor "Cisco"
Rv042g Firmware
Search vendor "Cisco" for product "Rv042g Firmware"
<= 4.2.3.10
Search vendor "Cisco" for product "Rv042g Firmware" and version " <= 4.2.3.10"
-
Affected
in Cisco
Search vendor "Cisco"
Rv042g
Search vendor "Cisco" for product "Rv042g"
--
Safe
Cisco
Search vendor "Cisco"
Rv082 Firmware
Search vendor "Cisco" for product "Rv082 Firmware"
<= 4.2.3.10
Search vendor "Cisco" for product "Rv082 Firmware" and version " <= 4.2.3.10"
-
Affected
in Cisco
Search vendor "Cisco"
Rv082
Search vendor "Cisco" for product "Rv082"
--
Safe
Cisco
Search vendor "Cisco"
Rv320 Firmware
Search vendor "Cisco" for product "Rv320 Firmware"
<= 1.5.1.05
Search vendor "Cisco" for product "Rv320 Firmware" and version " <= 1.5.1.05"
-
Affected
in Cisco
Search vendor "Cisco"
Rv320
Search vendor "Cisco" for product "Rv320"
--
Safe
Cisco
Search vendor "Cisco"
Rv325 Firmware
Search vendor "Cisco" for product "Rv325 Firmware"
<= 1.5.1.05
Search vendor "Cisco" for product "Rv325 Firmware" and version " <= 1.5.1.05"
-
Affected
in Cisco
Search vendor "Cisco"
Rv325
Search vendor "Cisco" for product "Rv325"
--
Safe