Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.
References
Link | Resource |
---|---|
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Oct/27 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2018-10-15 12:29
Updated : 2018-11-30 06:12
NVD link : CVE-2018-17532
Mitre link : CVE-2018-17532
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
teltonika
- rut950_firmware
- rut900_firmware
- rut950
- rut955_firmware
- rut955
- rut900