Lucene search

K
cveIcscertCVE-2023-32350
HistoryMay 22, 2023 - 4:15 p.m.

CVE-2023-32350

2023-05-2216:15:10
CWE-78
icscert
web.nvd.nist.gov
36
teltonika
rut router
firmware
os command injection
vulnerability
cve-2023-32350
nvd

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

30.7%

Versions 00.07.00 through 00.07.03 of Teltonika’s RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload.

Affected configurations

Nvd
Node
teltonika-networksrut200_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut200Match-
Node
teltonika-networksrut240_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut240Match-
Node
teltonika-networksrut241_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut241Match-
Node
teltonika-networksrut300_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut300Match-
Node
teltonika-networksrut360_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut360Match-
Node
teltonika-networksrut901_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut901Match-
Node
teltonika-networksrut950_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut950Match-
Node
teltonika-networksrut951_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut951Match-
Node
teltonika-networksrut955_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut955Match-
Node
teltonika-networksrut956_firmwareRange00.07.0000.07.03
AND
teltonika-networksrut956Match-
Node
teltonika-networksrutx08_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx08Match-
Node
teltonika-networksrutx09_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx09Match-
Node
teltonika-networksrutx10_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx10Match-
Node
teltonika-networksrutx11_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx11Match-
Node
teltonika-networksrutx12_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx12Match-
Node
teltonika-networksrutx14_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx14Match-
Node
teltonika-networksrutx50_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutx50Match-
Node
teltonika-networksrutxr1_firmwareRange00.07.0000.07.03
AND
teltonika-networksrutxr1Match-
VendorProductVersionCPE
teltonika-networksrut200_firmware*cpe:2.3:o:teltonika-networks:rut200_firmware:*:*:*:*:*:*:*:*
teltonika-networksrut200-cpe:2.3:h:teltonika-networks:rut200:-:*:*:*:*:*:*:*
teltonika-networksrut240_firmware*cpe:2.3:o:teltonika-networks:rut240_firmware:*:*:*:*:*:*:*:*
teltonika-networksrut240-cpe:2.3:h:teltonika-networks:rut240:-:*:*:*:*:*:*:*
teltonika-networksrut241_firmware*cpe:2.3:o:teltonika-networks:rut241_firmware:*:*:*:*:*:*:*:*
teltonika-networksrut241-cpe:2.3:h:teltonika-networks:rut241:-:*:*:*:*:*:*:*
teltonika-networksrut300_firmware*cpe:2.3:o:teltonika-networks:rut300_firmware:*:*:*:*:*:*:*:*
teltonika-networksrut300-cpe:2.3:h:teltonika-networks:rut300:-:*:*:*:*:*:*:*
teltonika-networksrut360_firmware*cpe:2.3:o:teltonika-networks:rut360_firmware:*:*:*:*:*:*:*:*
teltonika-networksrut360-cpe:2.3:h:teltonika-networks:rut360:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 361

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "RUT model routers",
    "vendor": "Teltonika",
    "versions": [
      {
        "lessThanOrEqual": "00.07.03",
        "status": "affected",
        "version": "00.07.00",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

30.7%

Related for CVE-2023-32350