CVE-2018-0125

Summary

CVECVE-2018-0125
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-02-08 07:29:00 UTC
Updated2019-10-09 23:31:00 UTC
DescriptionA vulnerability in the web interface of the Cisco RV132W ADSL2+ Wireless-N VPN and RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to an incomplete input validation on user-controlled input in an HTTP request to the targeted device. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary code as the root user and gain full control of the affected system or cause it to reload, resulting in a DoS condition. This vulnerability is fixed in firmware version 1.0.1.11 for the following Cisco products: RV132W ADSL2+ Wireless-N VPN Router and RV134W VDSL2 Wireless-AC VPN Router. Cisco Bug IDs: CSCvg92737, CSCvh60170.

Risk And Classification

EPSS: 0.294910000 probability, percentile 0.965860000 (date 2026-04-02)

CISA KEV: Listed on 2022-03-25; due 2022-04-15; ransomware use Unknown

Problem Types: CWE-20

CISA Known Exploited Vulnerability

VendorCisco
ProductVPN Routers
NameCisco VPN Routers Remote Code Execution Vulnerability
Required ActionApply updates per vendor instructions.
Noteshttps://nvd.nist.gov/vuln/detail/CVE-2018-0125

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Cisco Rv132w - All All All
Hardware Cisco Rv132w - All All All
Operating System Cisco Rv132w Firmware 1.0 All All All
Operating System Cisco Rv132w Firmware 1.0 All All All
Hardware Cisco Rv134w - All All All
Hardware Cisco Rv134w - All All All
Operating System Cisco Rv134w Firmware 1.0 All All All
Operating System Cisco Rv134w Firmware 1.0 All All All

References

ReferenceSourceLinkTags
Cisco RV132W and RV134W Remote Code Execution and Denial of Service Vulnerability CONFIRM tools.cisco.com Vendor Advisory
103140 BID www.securityfocus.com Third Party Advisory, VDB Entry
Cisco Small Business RV132W/RV134W Routers Let Remote Users Execute Arbitrary Code on the Target System - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report