6 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 36EXPL: 0

Versions 00.07.00 through 00.07.03 of Teltonika’s RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 36EXPL: 0

Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 • CWE-15: External Control of System or Configuration Setting •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 3

Teltonika RUT9XX routers with firmware before 00.05.01.1 are prone to cross-site scripting vulnerabilities in hotspotlogin.cgi due to insufficient user input sanitization. Los routers Teltonika RUT9XX con firmware en versiones anteriores a la 00.05.01.1 son propensos a vulnerabilidades Cross-Site Scripting (XSS) en hotspotlogin.cgi debido al saneamiento insuficiente de entradas de usuario. Teltonika RUT9XX routers with firmware before 00.05.01.1 are prone to cross site scripting vulnerabilities in hotspotlogin.cgi due to insufficient user input sanitization. • http://packetstormsecurity.com/files/149781/Teltonika-RUT9XX-Reflected-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2018/Oct/29 https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180410-01_Teltonika_Cross_Site_Scripting • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 3

Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. Los routers Teltonika RUT9XX con firmware en versiones anteriores a la 00.04.233 proporcionan un terminal root en una interfaz de serie sin un control de acceso adecuado. Esto permite que los atacantes con acceso físico ejecuten comandos arbitrarios con privilegios root. • http://packetstormsecurity.com/files/149779/Teltonika-RUT9XX-Missing-Access-Control-To-UART-Root-Terminal.html http://seclists.org/fulldisclosure/2018/Oct/28 https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-02_Teltonika_Incorrect_Access_Control • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 3

Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. Los routers Teltonika RUT9XX con firmware en versiones anteriores a la 00.04.233 son propensos a sufrir múltiples vulnerabilidades de inyección de comandos del sistema operativo sin autenticar en autologin.cgi y hotspotlogin.cgi debido al saneamiento insuficiente de entradas de usuario. Esto permite que los atacantes remotos ejecuten comandos arbitrarios con privilegios root. • http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html http://seclists.org/fulldisclosure/2018/Oct/27 https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •