A vulnerability in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges. Due to the nature of the vulnerability, only commands without parameters can be executed.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2021-08-04T17:20:26.563036Z

Updated: 2024-11-07T22:04:37.839Z

Reserved: 2020-11-13T00:00:00

Link: CVE-2021-1602

cve-icon Vulnrichment

Updated: 2024-08-03T16:18:11.055Z

cve-icon NVD

Status : Modified

Published: 2021-08-04T18:15:08.787

Modified: 2024-11-21T05:44:43.223

Link: CVE-2021-1602

cve-icon Redhat

No data.