CVE-2024-20520: RCE via Web UI on Cisco RV04x Routers (Admin Auth)
CVE-2024-20520 Published on October 2, 2024
Cisco Small Business RV042, RV042G, RV320, and RV325 Remote Command Execution Vulnerabilities
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
Vulnerability Analysis
CVE-2024-20520 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2024-20520 has been classified to as a Stack Overflow vulnerability or weakness.
Affected Versions
Cisco Small Business RV Series Router Firmware:- Version 4.0.2.08-tm is affected.
- Version 4.2.3.08 is affected.
- Version 4.1.1.01 is affected.
- Version 4.2.3.03 is affected.
- Version 3.0.0.1-tm is affected.
- Version 4.1.0.02-tm is affected.
- Version 4.2.3.09 is affected.
- Version 3.0.2.01-tm is affected.
- Version 4.2.3.10 is affected.
- Version 3.0.0.19-tm is affected.
- Version 4.2.3.06 is affected.
- Version 4.2.2.08 is affected.
- Version 4.0.3.03-tm is affected.
- Version 4.0.0.7 is affected.
- Version 4.2.1.02 is affected.
- Version 4.2.3.07 is affected.
- Version 4.0.4.02-tm is affected.
- Version 1.3.12.19-tm is affected.
- Version 1.3.12.6-tm is affected.
- Version 1.3.13.02-tm is affected.
- Version 1.3.1.10 is affected.
- Version 1.2.1.13 is affected.
- Version 1.1.1.19 is affected.
- Version 1.4.2.15 is affected.
- Version 1.5.1.05 is affected.
- Version 1.0.2.03 is affected.
- Version 1.1.0.09 is affected.
- Version 1.2.1.14 is affected.
- Version 1.3.2.02 is affected.
- Version 1.3.1.12 is affected.
- Version 1.0.1.17 is affected.
- Version 1.4.2.19 is affected.
- Version 1.1.1.06 is affected.
- Version 1.4.2.20 is affected.
- Version 1.4.2.22 is affected.
- Version 1.4.2.17 is affected.
- Version 4.2.3.14 is affected.
- Version 1.5.1.11 is affected.
- Version 1.5.1.13 is affected.
- Version 4.0.2.08-tm is affected.
- Version 4.2.3.08 is affected.
- Version 4.1.1.01 is affected.
- Version 4.2.3.03 is affected.
- Version 3.0.0.1-tm is affected.
- Version 4.1.0.02-tm is affected.
- Version 4.2.3.09 is affected.
- Version 3.0.2.01-tm is affected.
- Version 4.2.3.10 is affected.
- Version 3.0.0.19-tm is affected.
- Version 4.2.3.06 is affected.
- Version 4.2.2.08 is affected.
- Version 4.0.3.03-tm is affected.
- Version 4.0.0.7 is affected.
- Version 4.2.1.02 is affected.
- Version 4.2.3.07 is affected.
- Version 4.0.4.02-tm is affected.
- Version 1.3.12.19-tm is affected.
- Version 1.3.12.6-tm is affected.
- Version 1.3.13.02-tm is affected.
- Version 1.3.1.10 is affected.
- Version 1.2.1.13 is affected.
- Version 1.1.1.19 is affected.
- Version 1.4.2.15 is affected.
- Version 1.5.1.05 is affected.
- Version 1.0.2.03 is affected.
- Version 1.1.0.09 is affected.
- Version 1.2.1.14 is affected.
- Version 1.3.2.02 is affected.
- Version 1.3.1.12 is affected.
- Version 1.0.1.17 is affected.
- Version 1.4.2.19 is affected.
- Version 1.1.1.06 is affected.
- Version 1.4.2.20 is affected.
- Version 1.4.2.22 is affected.
- Version 1.4.2.17 is affected.
- Version 4.2.3.14 is affected.
- Version 1.5.1.11 is affected.
- Version 1.5.1.13 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.