cve/2018/CVE-2018-17532.md

23 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-17532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17532)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.
### POC
#### Reference
- http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/149777/Teltonika-RUT9XX-Unauthenticated-OS-Command-Injection.html
2024-05-26 14:27:05 +02:00
- http://seclists.org/fulldisclosure/2018/Oct/27
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2018/Oct/27
2024-05-26 14:27:05 +02:00
- https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection
2024-06-09 00:33:16 +00:00
- https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180319-01_Teltonika_OS_Command_Injection
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.