Vulnerability Description
A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input data by the web-based management interface. An attacker could exploit this vulnerability by sending crafted requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Rv110W Wireless-N Vpn Firewall Firmware | < 1.2.2.8 |
| Cisco | Rv110W Wireless-N Vpn Firewall | - |
| Cisco | Rv215W Wireless-N Vpn Router Firmware | < 1.3.1.7 |
| Cisco | Rv215W Wireless-N Vpn Router | - |
Related Weaknesses (CWE)
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cVendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cVendor Advisory
FAQ
What is CVE-2020-3331?
CVE-2020-3331 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrar...
How severe is CVE-2020-3331?
CVE-2020-3331 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-3331?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Rv110W Wireless-N Vpn Firewall Firmware, Cisco Rv110W Wireless-N Vpn Firewall, Cisco Rv215W Wireless-N Vpn Router Firmware, Cisco Rv215W Wireless-N Vpn Router.