CVE-2019-1652

HIGH KEV

Cisco Rv320 Firmware < 1.4.2.22 - OS Command Injection

Title source: rule

Description

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/46655
exploitdb WORKING POC VERIFIED
by RedTeam Pentesting · textwebappshardware
https://www.exploit-db.com/exploits/46243
nomisec WORKING POC 227 stars
by 0x27 · infoleak
https://github.com/0x27/CiscoRV320Dump
metasploit WORKING POC NORMAL
by RedTeam Pentesting GmbH, Philip Huppert, Benjamin Grap · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/cisco_rv32x_rce.rb

Scores

CVSS v3 7.2
EPSS 0.9273
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-03
VulnCheck KEV 2020-03-25
InTheWild.io 2019-01-29
ENISA EUVD EUVD-2019-10209
CWE
CWE-78 CWE-20
Status published
Products (2)
cisco/rv320_firmware 1.4.2.15 - 1.4.2.22
cisco/rv325_firmware 1.4.2.15 - 1.4.2.22
Published Jan 24, 2019
KEV Added Mar 03, 2022
Tracked Since Feb 18, 2026