CVE-2023-32349
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2023
Last modified:
01/06/2023
Description
<br />
Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.<br />
<br />
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:teltonika-networks:rut200_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut200:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut240_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut240:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut241_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut241:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut300_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut300:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut360_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut360:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut901_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut901:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut950_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) | |
cpe:2.3:h:teltonika-networks:rut950:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:teltonika-networks:rut951_firmware:*:*:*:*:*:*:*:* | 00.07.03.4 (including) |
To consult the complete list of CPE names with products and versions, see this page