NA

CVE-2023-32349

Published: 22/05/2023 Updated: 01/06/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

teltonika-networks rut200_firmware

teltonika-networks rut240_firmware

teltonika-networks rut241_firmware

teltonika-networks rut300_firmware

teltonika-networks rut360_firmware

teltonika-networks rut901_firmware

teltonika-networks rut950_firmware

teltonika-networks rut951_firmware

teltonika-networks rut955_firmware

teltonika-networks rut956_firmware

teltonika-networks rutx08_firmware

teltonika-networks rutx09_firmware

teltonika-networks rutx10_firmware

teltonika-networks rutx11_firmware

teltonika-networks rutx12_firmware

teltonika-networks rutx14_firmware

teltonika-networks rutx50_firmware

teltonika-networks rutxr1_firmware