CVE-2021-1151
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.5/10
- Exploit Score
- 6.8/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- Single
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 4.8/10
- Exploit Score
- 1.7/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- High
- Impact Score
- 2.7/10
- Confidentiality Impact
- Low
- Availability Impact
- None
- Integrity Impact
- Low
- Scope
- Changed
- User Interaction
- Required
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*: |
Yes
|
- | ||
cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*: |
Yes
|
- | ||
cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1. |
Yes
|
- | ||
cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2. |
Yes
|
- | ||
cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:* |
No
|
- |
Ready to dive in? Start your free trial today.
Companies of all sizes—from startups to Fortune 500s—use Mageni to scan their assets for vulnerabilities, reduce risk exposure and minimizing the likelihood of a data breach. Free for 7-days then $39 USD Monthly. No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.
Get Started For Free