diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 3ea1fe4057..15678da2b1 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -45252,6 +45252,58 @@ "notes": { } }, + "exploit_linux/http/cisco_rv130_rmi_rce": { + "name": "Cisco RV130W Routers Management Interface Remote Command Execution", + "full_name": "exploit/linux/http/cisco_rv130_rmi_rce", + "rank": 400, + "disclosure_date": "2019-02-27", + "type": "exploit", + "author": [ + "Yu Zhang", + "Haoliang Lu", + "T. Shiomitsu", + "Quentin Kaiser " + ], + "description": "A vulnerability in the web-based management interface of the Cisco RV130W Wireless-N Multifunction VPN Router\n could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.\n\n The vulnerability is due to improper validation of user-supplied data in the web-based management interface.\n An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device.\n\n A successful exploit could allow the attacker to execute arbitrary code on the underlying operating\n system of the affected device as a high-privilege user.\n\n RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected.\n\n Note: successful exploitation may not result in a session, and as such,\n on_new_session will never repair the HTTP server, leading to a denial-of-service condition.", + "references": [ + "CVE-2019-1663", + "BID-107185", + "URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex" + ], + "platform": "Linux", + "arch": "armle", + "rport": 443, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Cisco RV130/RV130W < 1.0.3.45" + ], + "mod_time": "2019-04-12 10:58:56 +0000", + "path": "/modules/exploits/linux/http/cisco_rv130_rmi_rce.rb", + "is_install_path": true, + "ref_name": "linux/http/cisco_rv130_rmi_rce", + "check": false, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-service-down" + ] + } + }, "exploit_linux/http/cisco_rv32x_rce": { "name": "Cisco RV320 and RV325 Unauthenticated Remote Code Execution", "full_name": "exploit/linux/http/cisco_rv32x_rce",