Description
Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36593 | Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution. |
References
History
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Teltonika-networks
Subscribe
Rut200
Subscribe
Rut200 Firmware
Subscribe
Rut240
Subscribe
Rut240 Firmware
Subscribe
Rut241
Subscribe
Rut241 Firmware
Subscribe
Rut300
Subscribe
Rut300 Firmware
Subscribe
Rut360
Subscribe
Rut360 Firmware
Subscribe
Rut901
Subscribe
Rut901 Firmware
Subscribe
Rut950
Subscribe
Rut950 Firmware
Subscribe
Rut951
Subscribe
Rut951 Firmware
Subscribe
Rut955
Subscribe
Rut955 Firmware
Subscribe
Rut956
Subscribe
Rut956 Firmware
Subscribe
Rutx08
Subscribe
Rutx08 Firmware
Subscribe
Rutx09
Subscribe
Rutx09 Firmware
Subscribe
Rutx10
Subscribe
Rutx10 Firmware
Subscribe
Rutx11
Subscribe
Rutx11 Firmware
Subscribe
Rutx12
Subscribe
Rutx12 Firmware
Subscribe
Rutx14
Subscribe
Rutx14 Firmware
Subscribe
Rutx50
Subscribe
Rutx50 Firmware
Subscribe
Rutxr1
Subscribe
Rutxr1 Firmware
Subscribe
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:34:23.944Z
Reserved: 2023-05-08T22:09:33.450Z
Link: CVE-2023-32349
Updated: 2024-08-02T15:10:24.909Z
Status : Modified
Published: 2023-05-22T16:15:10.420
Modified: 2024-11-21T08:03:09.730
Link: CVE-2023-32349
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD