CVE-2019-1652
HIGH KEVCisco Rv320 Firmware < 1.4.2.22 - OS Command Injection
Title source: ruleDescription
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/46655
exploitdb
WORKING POC
VERIFIED
by RedTeam Pentesting · textwebappshardware
https://www.exploit-db.com/exploits/46243
metasploit
WORKING POC
NORMAL
by RedTeam Pentesting GmbH, Philip Huppert, Benjamin Grap · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/cisco_rv32x_rce.rb
References (9)
Scores
CVSS v3
7.2
EPSS
0.9273
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-03-03
VulnCheck KEV
2020-03-25
InTheWild.io
2019-01-29
ENISA EUVD
EUVD-2019-10209
CWE
CWE-78
CWE-20
Status
published
Products (2)
cisco/rv320_firmware
1.4.2.15 - 1.4.2.22
cisco/rv325_firmware
1.4.2.15 - 1.4.2.22
Published
Jan 24, 2019
KEV Added
Mar 03, 2022
Tracked Since
Feb 18, 2026