A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 07:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-afu-EXxwA65V - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
Information
Published : 2023-04-05 16:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-20073
Mitre link : CVE-2023-20073
CVE.ORG link : CVE-2023-20073
JSON object : View
Products Affected
cisco
- rv340w
- rv345p
- rv345p_firmware
- rv345_firmware
- rv340
- rv340_firmware
- rv345
- rv340w_firmware
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type