{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T17:17:59.105","vulnerabilities":[{"cve":{"id":"CVE-2018-0405","sourceIdentifier":"psirt@cisco.com","published":"2018-10-05T17:29:00.277","lastModified":"2024-11-21T03:38:09.590","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web framework code for Cisco RV180W Wireless-N Multifunction VPN Router and Small Business RV Series RV220W Wireless Network Security Firewall could allow an unauthenticated, remote attacker to conduct a directory path traversal attack on a targeted device. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location."},{"lang":"es","value":"Una vulnerabilidad en el código framework web para Cisco RV180W Wireless-N Multifunction VPN Router y Small Business RV Series RV220W Wireless Network Security Firewall podría permitir que un atacante remoto realice un ataque de salto de directorio en un dispositivo objetivo. Este problema se debe al saneamiento incorrecto de las entradas proporcionadas por el usuario en parámetros de peticiones HTTP que describen nombres de archivo. Un atacante podría explotar esta vulnerabilidad empleando técnicas de salto de directorio para enviar una ruta a la localización de archivo que prefiera."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:rv180w_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"3D4116FE-D526-4FC6-9BFC-31155D467ADE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*","matchCriteriaId":"C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:rv220w_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A2FA50FE-0C86-4C7D-B6EF-5A0BF1989DD5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*","matchCriteriaId":"8620DFD9-E280-464E-91FF-2E901EDD49C0"}]}]}],"references":[{"url":"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk28019","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk28019","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}