Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Oct/27 | Exploit Mailing List Third Party Advisory |
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-10-15T19:00:00
Updated: 2018-10-15T18:57:01
Reserved: 2018-09-25T00:00:00
Link: CVE-2018-17532
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-10-15T19:29:01.617
Modified: 2018-11-30T14:12:57.920
Link: CVE-2018-17532
JSON object: View
Redhat Information
No data.
CWE