All posts by Loudagonda

Android Application Pentesting Handbook

This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.

android book

Buy it at Amazon

Cisco RV110W, RV130W, and RV215W Routers HTTP Request Buffer Overflow Vulnerability

  • A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewalls, Cisco RV130W Wireless-N Multifunction VPN Routers, and Cisco RV215W Wireless-N VPN Routers could allow an authenticated, remote attacker to cause a buffer overflow on a targeted system, resulting in a denial of service (DoS) condition.

    The vulnerability is due to improper sanitization of user-supplied input for fields in HTTP requests that are sent when a user configures an affected device by using the web-based management interface for the device. An attacker could exploit this vulnerability by sending an HTTP request that contains configuration commands with a crafted payload. A successful exploit could allow the attacker to cause a buffer overflow on the targeted system, which could cause the device to reload unexpectedly and result in a DoS condition.

    Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv3

  • Vulnerable Products

    All releases of the following Cisco products are affected by this vulnerability:

    • RV110W Wireless-N VPN Firewall
    • RV130W Wireless-N Multifunction VPN Router
    • RV215W Wireless-N VPN Router

    The web-based management interface is available for these devices via a local LAN connection or the remote management feature. By default, the remote management feature is disabled for the affected devices.

    To determine whether the remote management feature is enabled for a device, open the web-based management interface for the device and then choose Basic Settings > Remote Management. If the Enable check box is checked, remote management is enabled for the device.

    Products Confirmed Not Vulnerable

    No other Cisco products are currently known to be affected by this vulnerability.

Cisco RV110W, RV130W, and RV215W Routers HTTP Request Buffer Overflow Vulnerability

  • A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewalls, Cisco RV130W Wireless-N Multifunction VPN Routers, and Cisco RV215W Wireless-N VPN Routers could allow an authenticated, remote attacker to cause a buffer overflow on a targeted system, resulting in a denial of service (DoS) condition.

    The vulnerability is due to improper sanitization of user-supplied input for fields in HTTP requests that are sent when a user configures an affected device by using the web-based management interface for the device. An attacker could exploit this vulnerability by sending an HTTP request that contains configuration commands with a crafted payload. A successful exploit could allow the attacker to cause a buffer overflow on the targeted system, which could cause the device to reload unexpectedly and result in a DoS condition.

    Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160615-rv2

  • Vulnerable Products

    All releases of the following Cisco products are affected by this vulnerability:

    • RV110W Wireless-N VPN Firewall
    • RV130W Wireless-N Multifunction VPN Router
    • RV215W Wireless-N VPN Router

    The web-based management interface is available for these devices via a local LAN connection or the remote management feature. By default, the remote management feature is disabled for the affected devices.

    To determine whether the remote management feature is enabled for a device, open the web-based management interface for the device and then choose Basic Settings > Remote Management. If the Enable check box is checked, remote management is enabled for the device.

    Products Confirmed Not Vulnerable

    No other Cisco products are currently known to be affected by this vulnerability.