### [CVE-2019-1663](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1663) ![](https://img.shields.io/static/v1?label=Product&message=RV110W%20Wireless-N%20VPN%20Firewall&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=RV130W%20Wireless-N%20Multifunction%20VPN%20Router&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=RV215W%20Wireless-N%20VPN%20Router&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-119&color=brightgreen) ### Description A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected. ### POC #### Reference - http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html - http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html - http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html - https://www.exploit-db.com/exploits/46705/ #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/Oraxiage/CVE-2019-1663 - https://github.com/SexyBeast233/SecBooks - https://github.com/StealYourCode/CVE-2019-1663 - https://github.com/WolffCorentin/CVE-2019-1663-Binary-Analysis - https://github.com/XinRoom/dir2md - https://github.com/abrumsen/CVE-2019-1663 - https://github.com/cyb3r-w0lf/nuclei-template-collection - https://github.com/e180175/CVE-2019-1663-vuln - https://github.com/f1tao/awesome-iot-security-resource - https://github.com/sereok3/buffer-overflow-writeups - https://github.com/welove88888/Cisco-RV130W