Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
| Link | Resource |
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx | Vendor Advisory |
| http://seclists.org/fulldisclosure/2021/Apr/39 | Mailing List Third Party Advisory |
| http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Information
Published : 2021-04-07 21:15
Updated : 2022-08-05 10:36
NVD link : CVE-2021-1473
Mitre link : CVE-2021-1473
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
cisco
- rv340w_firmware
- rv340
- rv340w
- rv345_firmware
- rv340_firmware
- rv345p_firmware
- rv345
- rv345p


