Description
A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.
This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device.
This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18131 | A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-01T21:59:42.279Z
Reserved: 2023-11-08T15:08:07.663Z
Link: CVE-2024-20416
Updated: 2024-08-01T21:59:42.279Z
Status : Awaiting Analysis
Published: 2024-07-17T17:15:13.877
Modified: 2024-11-21T08:52:35.527
Link: CVE-2024-20416
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD