Vulnerability Details : CVE-2019-1663
Public exploit exists!
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.
Vulnerability category: OverflowMemory CorruptionExecute code
Products affected by CVE-2019-1663
- cpe:2.3:o:cisco:rv110w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rv215w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rv130w_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-1663
91.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2019-1663
-
Cisco RV110W/RV130(W)/RV215W Routers Management Interface Remote Command Execution
Disclosure Date: 2019-02-27First seen: 2020-04-26exploit/linux/http/cve_2019_1663_cisco_rmi_rceA vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an a
CVSS scores for CVE-2019-1663
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Cisco Systems, Inc. | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-1663
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: ykramarz@cisco.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-1663
-
http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html
Cisco RV110W / RV130(W) / RV215W Remote Command Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html
Cisco RV130W Routers Management Interface Remote Command Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/107185
Cisco RV110W/RV130W/RV215W Routers CVE-2019-1663 Remote Command Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://www.rapid7.com/db/modules/exploit/linux/http/cisco_rv130_rmi_rce
Cisco RV130W Routers Management Interface Remote Command Execution | Rapid7Exploit;Third Party Advisory
-
https://www.exploit-db.com/exploits/46705/
Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)Exploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html
Cisco RV130W 1.0.3.44 Remote Stack Overflow ≈ Packet StormThird Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex
Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution VulnerabilityVendor Advisory
Jump to