9.8
CVSSv3

CVE-2021-1473

Published: 08/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 790
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco rv340_firmware

cisco rv340w_firmware

cisco rv345_firmware

cisco rv345p_firmware

Vendor Advisories

Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device For more information about these vulnerabilities, see the Details section of this advisory Cisco has released software up ...

Exploits

Cisco RV-series routers suffer from an authentication bypass vulnerability The RV34X series are also affected by a command injection vulnerability in the sessionid cookie, when requesting the /upload endpoint A combination of these issues would allow any person who is able to communicate with the web interface to run arbitrary system commands on ...
This Metasploit module exploits an authentication bypass (CVE-2021-1472) and command injection (CVE-2021-1473) in the Cisco Small Business RV series of VPN/routers The device does not adequately verify the credentials in the HTTP Authorization field when requests are made to the /upload endpoint Then the uploadcgi binary will use the contents of ...
This module exploits an authentication bypass (CVE-2021-1472) and command injection (CVE-2021-1473) in the Cisco Small Business RV series of VPN/routers The device does not adequately verify the credentials in the HTTP Authorization field when requests are made to the /upload endpoint Then the uploadcgi binary will ...

Metasploit Modules

Cisco Small Business RV Series Authentication Bypass and Command Injection

This module exploits an authentication bypass (CVE-2021-1472) and command injection (CVE-2021-1473) in the Cisco Small Business RV series of VPN/routers. The device does not adequately verify the credentials in the HTTP Authorization field when requests are made to the /upload endpoint. Then the upload.cgi binary will use the contents of the HTTP Cookie field as part of a `curl` request aimed at an internal endpoint. The curl request is executed using `popen` and allows the attacker to inject commands via the Cookie field. A remote and unauthenticated attacker using this module is able to achieve code execution as `www-data`. This module affects the RV340, RV340w, RV345, and RV345P using firmware versions 1.0.03.20 and below.

msf > use exploit/linux/http/cisco_rv_series_authbypass_and_rce
msf exploit(cisco_rv_series_authbypass_and_rce) > show targets
    ...targets...
msf exploit(cisco_rv_series_authbypass_and_rce) > set TARGET < target-id >
msf exploit(cisco_rv_series_authbypass_and_rce) > show options
    ...show and set options...
msf exploit(cisco_rv_series_authbypass_and_rce) > exploit

Github Repositories

with this cyber security topics you can level up your knowledge for more influnce ( out of the box ) - include every you thinking, it can be developed at any time. it's helpful for "syber security operation center", "penetration tester", " Red Teaming", "Blue Teaming" . Is included fundamental

Special cybersecurity topic with this cyber security topics you can level up your knowledge for more influnce ( out of the box ) - include every you thinking, it can be developed at any time it's helpful for cyber security operation center, penetration tester, Red Teaming, Blue Teaming Is included fundamental? yes, because every descussion are useful ( don't get rid