Vulnerability Description
A vulnerability in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges. Due to the nature of the vulnerability, only commands without parameters can be executed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Small Business Rv Series Router Firmware | < 1.0.01.04 |
| Cisco | Small Business Rv160 | - |
| Cisco | Small Business Rv160W | - |
| Cisco | Small Business Rv260 | - |
| Cisco | Small Business Rv260P | - |
| Cisco | Small Business Rv260W | - |
Related Weaknesses (CWE)
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rVendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rVendor Advisory
FAQ
What is CVE-2021-1602?
CVE-2021-1602 is a vulnerability with a CVSS score of 8.2 (HIGH). A vulnerability in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary ...
How severe is CVE-2021-1602?
CVE-2021-1602 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-1602?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Small Business Rv Series Router Firmware, Cisco Small Business Rv160, Cisco Small Business Rv160W, Cisco Small Business Rv260, Cisco Small Business Rv260P.