Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1663 PoC — Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability

Source
Associated Vulnerability
Title:Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability (CVE-2019-1663)
Description:A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.
Description
Exploiting the pre-authentication code execution vulnerability found on RV130 cisco routers in 2019.
Readme
# CVE-2019-1663
Exploiting the pre-authentication code execution vulnerability found on RV130 cisco routers in 2019.
File Snapshot

[4.0K] /data/pocs/100e0c5d176a4e2635c4e37e6ba02a62414a8749 ├── [1.7K] cve-2019-1663.py └── [ 117] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →