6.5

CVE-2024-20416

A vulnerability in the upload module of Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.

 This vulnerability is due to insufficient boundary checks when processing specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the device.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellercisco
Produkt rv340_dual_wan_gigabit_vpn_router_firmware
Default Statusunknown
Version <= *
Version 1.0.03.24
Status affected
Herstellercisco
Produkt rv345_dual_wan_gigabit_vpn_router_firmware
Default Statusunknown
Version <= *
Version 1.0.03.24
Status affected
Herstellercisco
Produkt rv345p_dual_wan_gigabit_poe_vpn_router_firmware
Default Statusunknown
Version <= *
Version 1.0.03.24
Status affected
Herstellercisco
Produkt rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware
Default Statusunknown
Version <= *
Version 1.0.03.24
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.62% 0.7
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 6.5 1.2 5.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CWE-130 Improper Handling of Length Parameter Inconsistency

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.