Cisco Small Business Router Security Flaws Allow Malicious Code Execution, Patch ASAP
The advisory, which was first published on February 2 and updated again on February 4 of 2022, outlines that a large number of bugs have been patched in the latest firmware available for the devices. The bugs that were patched allow things such as arbitrary code execution, elevating privileges, arbitrary command execution, and bypass authorization and authentication. These are particularly nasty in that they effectively allow an attacker to log into the affected device and in turn run whatever they want on it by elevating their privileges on the device. Because this makes access to the device directly available, it also allows the attacker to download and run unsigned software and even drive denial-of-service attacks utilizing any of these Cisco routers.

As of right now, Cisco states that only the following models are affected by the vulnerabilities:
- RV160 VPN Routers
- RV160W Wireless-AC VPN Routers
- RV260 VPN Routers
- RV260P VPN Routers with PoE
- RV260W Wireless-AC VPN Routers
- RV340 Dual WAN Gigabit VPN Routers
- RV340W Dual WAN Gigabit Wireless-AC VPN Routers
- RV345 Dual WAN Gigabit VPN Routers
- RV345P Dual WAN Gigabit POE VPN Routers