So signing using RSA with a key size of 2048 with a SHA-1 hash over the content should be regarded secure just like HMAC-SHA-1, correct?
The practical answer is: No, this is still insecure with all deployed RSA-based signature schemes. If you're just asking about using existing tools to make RSA-based signatures, stop here: SHA-1 is bad news, and don't touch it. (Also, don't use RSA in new applications; if you want signatures, use Ed25519.)
To get an answer in more detail, you really need to specify which signature scheme you're talking about—‘RSA’ alone just refers to the trapdoor permutation family $x \mapsto x^e \bmod n$, which is not a signature scheme (or encryption scheme) in itself. The most popular signature schemes based on RSA are RSASSA-PKCS1-v1_5 and RSASSA-PSS from PKCS#1, also published as RFC 3447.
In these signature schemes, a signature on a message $m$ under public key $(n,e)$ is an integer $s$ such that $$s^e \equiv f_r(H(m)) \pmod n,$$ where $f_r$ is some randomized function. RSASSA-PKCS1-v1_5 is not actually randomized, so $f_r(h)$ just adds some fixed padding to $h$ and ignores $r$; RSASSA-PSS is randomized, and $f_r(h)$ roughly encodes the pair $(r, h)$ in a roundabout way that makes proving theorems easy.
The details of $f_r$ aren't important—what is important is: The signature equation is defined in terms of $H(m)$ so the ability to find collisions in $H$ implies the ability to forge signatures. So if a forger can find two messages $m \ne m'$ such that $H(m) = H(m')$, they can ask the legitimate user to sign $m$, and then $s$ will work as a forged signature on $m'$ too that the legitimate user never meant to sign.
But it is a historical accident that the randomization $r$ of the signature scheme didn't figure into hashing the message! Had RSASSA-PSS used $\operatorname{HMAC-}\!H_r(m)$ instead of $H(m)$, or even just $H(r \mathbin\| m)$, it likely would have been resilient to collisions in $H$—and in fact, the original PSS proposal to IEEE pointed out that using $H(r \mathbin\| m)$ instead of $H(m)$ does not seem to rely on collision resistance of $H$.
This is not just a trivial change: using $H(r \mathbin\| m)$ likely would have thwarted certificate forgery attacks on MD5, which were exploited (paywall-free preprint) by the governments of the United States and Israel in an international incident of industrial sabotage against Iran. Today, the standard countermeasure against this adopted by the CA/Browser Forum for certificates is randomization of the CA serial number, which has an effect similar to (though slightly weaker than) using $H(r \mathbin\| m)$—but it requires application-specific changes where the signature scheme could have thwarted the entire class of attacks for all applications.
So reliance on plain collision resistance is a historical design mistake of essentially all RSA-based signature schemes that are deployed today. But there are randomized signature schemes like the original PSS proposal—and even deployed signature schemes (though not RSA-based) like Ed25519, which is the signature scheme you should reach for in new applications today—that are resilient to collisions by virtue of using $H(r \mathbin\| m)$ instead of $H(m)$. More background and history.