CVE-2019-15271

HIGH KEV

Cisco Rv016 Multi-wan VPN Firmware - Insecure Deserialization

Title source: rule

Description

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

Scores

CVSS v3 8.8
EPSS 0.0560
EPSS Percentile 90.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-06-08
VulnCheck KEV 2022-06-07
InTheWild.io 2022-06-08
ENISA EUVD EUVD-2019-6279

Classification

CWE
CWE-502
Status published

Affected Products (4)

cisco/rv016_multi-wan_vpn_firmware < 4.2.3.10
cisco/rv042_dual_wan_vpn_firmware < 4.2.3.10
cisco/rv042g_dual_gigabit_wan_vpn_firmware < 4.2.3.10
cisco/rv082_dual_wan_vpn_firmware < 4.2.3.10

Timeline

Published Nov 26, 2019
KEV Added Jun 08, 2022
Tracked Since Feb 18, 2026