We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20470

Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Remote Code Execution Vulnerability



Assignercisco
Reserved2023-11-08
Published2024-10-02
Updated2024-10-02

Description

A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.

Problem types

Improper Neutralization of Expression/Command Delimiters

Product status

Default status
unknown

1.0.01.17
affected

1.0.03.17
affected

1.0.01.16
affected

1.0.01.18
affected

1.0.00.29
affected

1.0.03.16
affected

1.0.03.15
affected

1.0.02.16
affected

1.0.01.20
affected

1.0.00.33
affected

1.0.03.18
affected

1.0.03.19
affected

1.0.03.20
affected

1.0.03.21
affected

1.0.03.22
affected

1.0.03.24
affected

1.0.03.26
affected

1.0.03.27
affected

1.0.03.28
affected

1.0.03.29
affected

References

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms (cisco-sa-rv34x-privesc-rce-qE33TCms)

cve.org CVE-2024-20470

nvd.nist.gov CVE-2024-20470

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.