Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.

Project Subscriptions

Vendors Products
Teltonika-networks Subscribe
Rut200 Firmware Subscribe
Rut240 Firmware Subscribe
Rut241 Firmware Subscribe
Rut300 Firmware Subscribe
Rut360 Firmware Subscribe
Rut901 Firmware Subscribe
Rut950 Firmware Subscribe
Rut951 Firmware Subscribe
Rut955 Firmware Subscribe
Rut956 Firmware Subscribe
Rutx08 Firmware Subscribe
Rutx09 Firmware Subscribe
Rutx10 Firmware Subscribe
Rutx11 Firmware Subscribe
Rutx12 Firmware Subscribe
Rutx14 Firmware Subscribe
Rutx50 Firmware Subscribe
Rutxr1 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-36593 Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:34:23.944Z

Reserved: 2023-05-08T22:09:33.450Z

Link: CVE-2023-32349

cve-icon Vulnrichment

Updated: 2024-08-02T15:10:24.909Z

cve-icon NVD

Status : Modified

Published: 2023-05-22T16:15:10.420

Modified: 2024-11-21T08:03:09.730

Link: CVE-2023-32349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses