Rapid7 Vulnerability & Exploit Database

Cisco RV130W Routers Management Interface Remote Command Execution

Back to Search

Cisco RV130W Routers Management Interface Remote Command Execution

Disclosed
02/27/2019
Created
04/22/2019

Description

A vulnerability in the web-based management interface of the Cisco RV130W Wireless-N Multifunction VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. Note: successful exploitation may not result in a session, and as such, on_new_session will never repair the HTTP server, leading to a denial-of-service condition.

Author(s)

  • Yu Zhang
  • Haoliang Lu
  • T. Shiomitsu
  • Quentin Kaiser <kaiserquentin@gmail.com>

Platform

Linux

Architectures

armle

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/cisco_rv130_rmi_rce
msf exploit(cisco_rv130_rmi_rce) > show targets
    ...targets...
msf exploit(cisco_rv130_rmi_rce) > set TARGET < target-id >
msf exploit(cisco_rv130_rmi_rce) > show options
    ...show and set options...
msf exploit(cisco_rv130_rmi_rce) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;