CVE-2021-1287
Severity CVSS v4.0:
Pending analysis
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
18/03/2021
Last modified:
07/11/2023
Description
A vulnerability in the web-based management interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition on the affected device.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:rv132w_firmware:*:*:*:*:*:*:*:* | 1.0.1.15 (excluding) | |
| cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:rv134w_firmware:*:*:*:*:*:*:*:* | 1.0.1.21 (excluding) | |
| cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



