Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1663 PoC — Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability

Source
Associated Vulnerability
Title:Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability (CVE-2019-1663)
Description:A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected.
Description
Docs on the Vulnerability CVE-2019-1663 (Cisco Routers)
Readme
# CVE-2019-1663

The purpose of this repository is to gather my research on the CVE-2019-1663 vulnerability, 
This vulnerability was discovered in version 1.0.44.0 of Cisco's RV110, RV130 and RV225 routers.
File Snapshot

[4.0K] /data/pocs/c63ded91f1e3c3c95966d5d16d3bb79a7e436267 ├── [4.1K] Base_httpd ├── [2.5K] Pseudo_httpd ├── [ 207] README.md └── [4.4K] Translated_httpd 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →