CVE-2021-1287

A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:rv132w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:rv134w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*

History

29 Mar 2021, 16:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 7.2
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-132w134w-overflow-Pptt4H2p - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-132w134w-overflow-Pptt4H2p - Vendor Advisory
CPE cpe:2.3:o:cisco:rv134w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:rv132w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*

18 Mar 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-18 19:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-1287

Mitre link : CVE-2021-1287

CVE.ORG link : CVE-2021-1287


JSON object : View

Products Affected

cisco

  • rv132w_firmware
  • rv132w
  • rv134w_firmware
  • rv134w
CWE
CWE-121

Stack-based Buffer Overflow