Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
teltonika vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2020-5785
Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.04.3 allows an unauthenticated malicious user to conduct reflected cross-site scripting via a crafted ‘action’ or ‘pkg_name’ parameter.
Teltonika-networks Trb245 Firmware 00.02.04.03
6.5
CVSSv3
CVE-2020-5787
Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated malicious user to delete arbitrary files on disk via the admin/services/packages/remove action.
Teltonika-networks Trb245 Firmware 00.02.04.03
8.3
CVSSv3
CVE-2023-2587
Teltonika’s Remote Management System versions before 4.10.0 contain a cross-site scripting (XSS) vulnerability in the main page of the web interface. An attacker with the MAC address and serial number of a connected device could send a maliciously crafted JSON file with an...
Teltonika Remote Management System
8.8
CVSSv3
CVE-2023-2588
Teltonika’s Remote Management System versions before 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System...
Teltonika Remote Management System
9.8
CVSSv3
CVE-2023-2586
Teltonika’s Remote Management System versions 4.14.0 is vulnerable to an unauthorized attacker registering previously unregistered devices through the RMS platform. If the user has not disabled the "RMS management feature" enabled by default, then an attacker cou...
Teltonika Remote Management System 4.14.0
NA
CVE-2024-22727
Teltonika TRB1-series devices with firmware before TRB1_R_00.07.05.2 allow malicious users to exploit a firmware vulnerability via Ethernet LAN or USB.
NA
CVE-2023-31728
Teltonika RUT240 devices with firmware prior to 07.04.2, when bridge mode is used, sometimes make SSH and HTTP services available on the IPv6 WAN interface even though the UI shows that they are only available on the LAN interface.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3