CVE-2018-17532

Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:teltonika:rut900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teltonika:rut900:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:teltonika:rut950_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teltonika:rut950:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:teltonika:rut955_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teltonika:rut955:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:54

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2018/Oct/27 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Oct/27 - Exploit, Mailing List, Third Party Advisory
References () https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection - Exploit, Third Party Advisory () https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection - Exploit, Third Party Advisory

Information

Published : 2018-10-15 19:29

Updated : 2024-11-21 03:54


NVD link : CVE-2018-17532

Mitre link : CVE-2018-17532

CVE.ORG link : CVE-2018-17532


JSON object : View

Products Affected

teltonika

  • rut950_firmware
  • rut900
  • rut950
  • rut900_firmware
  • rut955_firmware
  • rut955
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')