Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Teltonika-networks
Subscribe
|
Rut200
Subscribe
Rut200 Firmware
Subscribe
Rut240
Subscribe
Rut240 Firmware
Subscribe
Rut241
Subscribe
Rut241 Firmware
Subscribe
Rut300
Subscribe
Rut300 Firmware
Subscribe
Rut360
Subscribe
Rut360 Firmware
Subscribe
Rut901
Subscribe
Rut901 Firmware
Subscribe
Rut950
Subscribe
Rut950 Firmware
Subscribe
Rut951
Subscribe
Rut951 Firmware
Subscribe
Rut955
Subscribe
Rut955 Firmware
Subscribe
Rut956
Subscribe
Rut956 Firmware
Subscribe
Rutx08
Subscribe
Rutx08 Firmware
Subscribe
Rutx09
Subscribe
Rutx09 Firmware
Subscribe
Rutx10
Subscribe
Rutx10 Firmware
Subscribe
Rutx11
Subscribe
Rutx11 Firmware
Subscribe
Rutx12
Subscribe
Rutx12 Firmware
Subscribe
Rutx14
Subscribe
Rutx14 Firmware
Subscribe
Rutx50
Subscribe
Rutx50 Firmware
Subscribe
Rutxr1
Subscribe
Rutxr1 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36593 | Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:34:23.944Z
Reserved: 2023-05-08T22:09:33.450Z
Link: CVE-2023-32349
Updated: 2024-08-02T15:10:24.909Z
Status : Modified
Published: 2023-05-22T16:15:10.420
Modified: 2024-11-21T08:03:09.730
Link: CVE-2023-32349
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD