Advertisement






CISCO RV110W RV215W CVR100W Bypass Login Page

CVE Category Price Severity
CVE-2014-0683 CWE-287 Unknown High
Author Risk Exploitation Type Date
Larry W. Cashdollar High Remote 2014-03-06
CPE
cpe:cpe:/a:cisco:rv110w
CVSS EPSS EPSSP
CVSS:9.3/AV:N/AC:M/Au:N/C:C/I:C/A:C 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2014030043

Below is a copy:

Title:
======
Router CISCO RV110W - RV215W - CVR100W - Bypass Login Page


Date:
=====
05/03/2014


CVE Number:
============
CVE-2014-0683


Cisco Security Advisory:
===========
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-rpd


Status:
========
Reported to Cisco - Fixed in new firmware


Affected Products:
==================
- Cisco RV110W Wireless-N VPN Firewall running firmware versions 1.2.0.9
and   prior.
- Cisco RV215W Wireless-N VPN Router running firmware versions 1.1.0.5 and
  prior.
- Cisco CVR100W Wireless-N VPN Router running firmware versions 1.0.1.19
and   prior.


Exploitation-Technique:
=======================
Remote - Internal


Severity:
=========
High


Details:
========
An attacker can bypass the login page of the router just manipulating the
POST data in the administration page (ex: 192.168.1.1) and gain access like
admin.
See the PDF for more details.
https://drive.google.com/file/d/0BzDR2c9r47AiMVlQWkVNVjE0REU/edit?usp=sharing


Affected Versions:
================
Cisco RV110W Wireless-N VPN Firewall running firmware versions 1.2.0.9 and
prior
Cisco RV215W Wireless-N VPN Router running firmware versions 1.1.0.5 and
prior
Cisco CVR100W Wireless-N VPN Router running firmware versions 1.0.1.19 and
prior


Proof of Concept:
=================
See the PDF for more details.
https://drive.google.com/file/d/0BzDR2c9r47AiMVlQWkVNVjE0REU/edit?usp=sharing


Solution:
=========
Update the router with the last firmware.


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum