Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-1228 | A vulnerability in the web framework code for Cisco RV180W Wireless-N Multifunction VPN Router and Small Business RV Series RV220W Wireless Network Security Firewall could allow an unauthenticated, remote attacker to conduct a directory path traversal attack on a targeted device. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. |
| Link | Providers |
|---|---|
| https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk28019 |
|
Tue, 26 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-26T14:26:09.815Z
Reserved: 2017-11-27T00:00:00.000Z
Link: CVE-2018-0405
Updated: 2024-08-05T03:21:15.612Z
Status : Modified
Published: 2018-10-05T17:29:00.277
Modified: 2024-11-21T03:38:09.590
Link: CVE-2018-0405
No data.
OpenCVE Enrichment
No data.
EUVD