Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-6422

Disclosure Date: July 10, 2024 (last updated September 06, 2024)
An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.
Attacker Value
Unknown

CVE-2024-6421

Disclosure Date: July 10, 2024 (last updated September 06, 2024)
An unauthenticated remote attacker can read out sensitive device information through a incorrectly configured FTP service.
Attacker Value
Unknown

CVE-2023-32350

Disclosure Date: May 22, 2023 (last updated February 25, 2025)
Versions 00.07.00 through 00.07.03 of Teltonika’s RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload.
Attacker Value
Unknown

CVE-2023-32349

Disclosure Date: May 22, 2023 (last updated February 25, 2025)
Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.
Attacker Value
Unknown

CVE-2021-38701

Disclosure Date: December 15, 2021 (last updated February 23, 2025)
Certain Motorola Solutions Avigilon devices allow XSS in the administrative UI. This affects T200/201 before 4.10.0.68; T290 before 4.4.0.80; T008 before 2.2.0.86; T205 before 4.12.0.62; T204 before 3.28.0.166; and T100, T101, T102, and T103 before 2.6.0.180.
Attacker Value
Unknown

CVE-2015-6358

Disclosure Date: October 12, 2017 (last updated November 26, 2024)
Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913.
0