2 results (0.052 seconds)

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered on Teltonika RTU950 R_31.04.89 devices. The application allows a user to login without limitation. For every successful login request, the application saves a session. A user can re-login without logging out, causing the application to store the session in memory. Exploitation of this vulnerability will increase memory use and consume free space. • https://www.triadsec.com https://www.triadsec.com/CVE-2018-19878.pdf • CWE-416: Use After Free •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in /cgi-bin/luci on Teltonika RTU9XX (e.g., RUT950) R_31.04.89 before R_00.05.00.5 devices. The authentication functionality is not protected from automated tools used to make login attempts to the application. An anonymous attacker has the ability to make unlimited login attempts with an automated tool. This ability could lead to cracking a targeted user's password. Se ha descubierto un fallo en /cgi-bin/luci en dispositivos de Teltonika RTU9XX (p.ej., RUT950), desde R_31.04.89 hasta R_00.05.00.5. • https://wiki.teltonika.lt/index.php?title=RUT9xx_Firmware https://www.triadsec.com/CVE-2018-19879.pdf • CWE-307: Improper Restriction of Excessive Authentication Attempts •