First published: Mon Jul 03 2017(Updated: )
The management interface for the Teltonika RUT9XX routers (aka LuCI) with firmware 00.03.265 and earlier allows remote attackers to execute arbitrary commands with root privileges via shell metacharacters in the username parameter in a login request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika RUT900 Firmware | <=00.03.265 | |
Teltonika RUT900 Firmware | ||
Teltonika RUT905 Firmware | <=00.03.265 | |
Teltonika RUT905 Firmware | ||
Teltonika RUT950 Firmware | <=00.03.265 | |
Teltonika Networks RUT950 Firmware | ||
Teltonika RUT955 Firmware | <=00.03.265 | |
Teltonika RUT955 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8116 has a high severity rating as it allows remote attackers to execute arbitrary commands with root privileges.
To fix CVE-2017-8116, update the firmware of Teltonika RUT9XX routers to a version later than 00.03.265.
CVE-2017-8116 affects Teltonika RUT900, RUT905, RUT950, and RUT955 models with firmware versions 00.03.265 and earlier.
Yes, CVE-2017-8116 can be exploited remotely by attackers who send crafted login requests.
CVE-2017-8116 is classified as a remote code execution vulnerability due to improper input validation in the management interface.