CVE-2018-17532
Summary
| CVE | CVE-2018-17532 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-10-15 19:29:00 UTC |
| Updated | 2018-11-30 14:12:00 UTC |
| Description | Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Teltonika | Rut900 | - | All | All | All |
| Hardware | Teltonika | Rut900 | - | All | All | All |
| Operating System | Teltonika | Rut900 Firmware | All | All | All | All |
| Operating System | Teltonika | Rut900 Firmware | All | All | All | All |
| Hardware | Teltonika | Rut950 | - | All | All | All |
| Hardware | Teltonika | Rut950 | - | All | All | All |
| Operating System | Teltonika | Rut950 Firmware | All | All | All | All |
| Operating System | Teltonika | Rut950 Firmware | All | All | All | All |
| Hardware | Teltonika | Rut955 | - | All | All | All |
| Hardware | Teltonika | Rut955 | - | All | All | All |
| Operating System | Teltonika | Rut955 Firmware | All | All | All | All |
| Operating System | Teltonika | Rut955 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Teltonika RUT9XX Unauthenticated OS Command Injection ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| advisories/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection at public · sbaresearch/advisories · GitHub | MISC | github.com | Exploit, Third Party Advisory |
| Full Disclosure: [SBA-ADV-20180319-01] CVE-2018-17532: Teltonika RUT9XX Unauthenticated OS Command Injection | FULLDISC | seclists.org | Exploit, Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.