Description

Versions 00.07.00 through 00.07.03 of Teltonika’s RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload.

Published: 2023-05-22
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-36594 Versions 00.07.00 through 00.07.03 of Teltonika’s RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload.
History

Fri, 17 Jan 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Teltonika-networks Rut200 Rut200 Firmware Rut240 Rut240 Firmware Rut241 Rut241 Firmware Rut300 Rut300 Firmware Rut360 Rut360 Firmware Rut901 Rut901 Firmware Rut950 Rut950 Firmware Rut951 Rut951 Firmware Rut955 Rut955 Firmware Rut956 Rut956 Firmware Rutx08 Rutx08 Firmware Rutx09 Rutx09 Firmware Rutx10 Rutx10 Firmware Rutx11 Rutx11 Firmware Rutx12 Rutx12 Firmware Rutx14 Rutx14 Firmware Rutx50 Rutx50 Firmware Rutxr1 Rutxr1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:34:13.864Z

Reserved: 2023-05-08T22:09:33.450Z

Link: CVE-2023-32350

cve-icon Vulnrichment

Updated: 2024-08-02T15:10:24.899Z

cve-icon NVD

Status : Modified

Published: 2023-05-22T16:15:10.497

Modified: 2024-11-21T08:03:09.873

Link: CVE-2023-32350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses