A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.
This vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2024-10-02 17:15
Updated : 2024-10-08 14:37
NVD link : CVE-2024-20393
Mitre link : CVE-2024-20393
CVE.ORG link : CVE-2024-20393
JSON object : View
Products Affected
cisco
- rv345p_dual_wan_gigabit_poe_vpn_router
- rv340w_dual_wan_gigabit_wireless-ac_vpn_router
- rv340_dual_wan_gigabit_vpn_router
- rv345_dual_wan_gigabit_vpn_router
- rv345_dual_wan_gigabit_vpn_router_firmware
- rv345p_dual_wan_gigabit_poe_vpn_router_firmware
- rv340_dual_wan_gigabit_vpn_router_firmware
- rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware
CWE