CVE-2021-34730

CRITICAL EXPLOITED RANSOMWARE

Cisco Application Extension Platform - Out-of-Bounds Write

Title source: rule

Description

A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.

Exploits (1)

nomisec WORKING POC 28 stars
by badmonkey7 · remote
https://github.com/badmonkey7/CVE-2021-34730

Scores

CVSS v3 9.8
EPSS 0.3727
EPSS Percentile 97.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2022-06-22
Ransomware Use Confirmed
CWE
CWE-121 CWE-787
Status published
Products (5)
cisco/application_extension_platform 1.0.3.55
cisco/rv110w_wireless-n_vpn_firewall_firmware
cisco/rv130_vpn_router_firmware
cisco/rv130w_wireless-n_multifunction_vpn_router_firmware
cisco/rv215w_wireless-n_vpn_router_firmware
Published Aug 18, 2021
Tracked Since Feb 18, 2026