A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.
Use CWE-502, Cisco vendor hub and Rv016 Multi-Wan Vpn Firmware product page to widen CVE-2019-15271 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-15957, CVE-2019-15990 and CVE-2015-6418 for nearby disclosures in the same product family. Additional editorial context is available in The Weekly Cybersecurity Brief: January 30th, 2026.