Cisco Small Business Rv Series Router Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Cisco Small Business Rv Series Router Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in Cisco Small Business Rv Series Router Firmware. Small Business Rv Series Router Firmware did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 8.80 |
| 2023 | 1 | 6.50 |
It may take a day or so for new Small Business Rv Series Router Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Cisco Small Business Rv Series Router Firmware Security Vulnerabilities
Cisco NSO JSON-RPC API Improper Auth Allow Remote Config Mod
CVE-2024-20381
8.8 - High
- September 11, 2024
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device. This vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system.
Authenticated Remote Code Execution in Cisco RV Router Web UI
CVE-2023-20250
6.5 - Medium
- September 06, 2023
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code with root privileges on an affected device. To exploit this vulnerability, the attacker must have valid Administrator credentials on the affected device.
Stack Overflow
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Cisco Small Business Rv Series Router Firmware or by Cisco? Click the Watch button to subscribe.