First published: Thu Apr 08 2021(Updated: )
Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Rv340 Firmware | <1.0.03.21 | |
Cisco RV340 | ||
Cisco Rv340w Firmware | <1.0.03.21 | |
Cisco Rv340w | ||
Cisco Rv345 Firmware | <1.0.03.21 | |
Cisco Rv345 | ||
Cisco Rv345p Firmware | <1.0.03.21 | |
Cisco Rv345p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1473.
The severity rating for CVE-2021-1473 is critical.
The affected software versions for CVE-2021-1473 are Cisco Rv340 Firmware up to and excluding version 1.0.03.21, Cisco Rv340w Firmware up to and excluding version 1.0.03.21, Cisco Rv345 Firmware up to and excluding version 1.0.03.21, and Cisco Rv345p Firmware up to and excluding version 1.0.03.21.
The potential impacts of the vulnerabilities in CVE-2021-1473 include execution of arbitrary commands by a remote attacker, bypassing authentication, and uploading files on an affected device.
You can find more information about CVE-2021-1473 in the following references: [Packetstorm Security](http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html), [Full Disclosure](http://seclists.org/fulldisclosure/2021/Apr/39), and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx).