TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-15271

HIGHCISA KEV
8.8

Beschreibung

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

CVE Details

CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht11/26/2019
Zuletzt geandert10/28/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerCisco
ProduktRV Series Routers
SchwachstellennameCisco RV Series Routers Deserialization of Untrusted Data Vulnerability
KEV Aufnahmedatum2022-06-08
Behebungsfrist2022-06-22
Ransomware-NutzungUnknown

Betroffene Produkte

cisco:rv016_multi-wan_vpncisco:rv016_multi-wan_vpn_firmwarecisco:rv042_dual_wan_vpncisco:rv042_dual_wan_vpn_firmwarecisco:rv042g_dual_gigabit_wan_vpncisco:rv042g_dual_gigabit_wan_vpn_firmwarecisco:rv082_dual_wan_vpncisco:rv082_dual_wan_vpn_firmware

Schwachen (CWE)

CWE-502CWE-502

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.