A vulnerability in the Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers web-based administration interface could allow an unauthenticated, remote attacker to extract sensitive information.The vulnerability is caused by URL access controls that aren’t set up correctly. By connecting to an affected device through HTTP or HTTPS and requesting specified URLs, an attacker could exploit this issue. An attacker could download the router settings or comprehensive diagnostic information if the exploit is successful.
In order to patch this vulnerability, please install the official patch Cisco made available for supported, vulnerable instances.