CVE-2023-32349
22.05.2023, 16:15
Version 00.07.03.4 and prior of Teltonikas RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.Enginsight
Vendor | Product | Version |
---|---|---|
teltonika-networks | rut200_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut240_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut241_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut300_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut360_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut901_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut950_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut951_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut955_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rut956_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx08_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx09_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx10_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx11_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx12_firmware | 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx14_firmware | 00.07.00 ≤ 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutx50_firmware | 00.07.00 ≤ 𝑥 ≤ 00.07.03.4 |
teltonika-networks | rutxr1_firmware | 00.07.00 ≤ 𝑥 ≤ 00.07.03.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration