First published: Fri Jul 17 2020(Updated: )
Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.02 allows a remote, authenticated attacker to conduct persistent cross-site scripting (XSS) attacks by injecting malicious client-side code into the 'URL/ Host / Connection' form in the 'DATA TO SERVER' configuration section.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teltonika-networks Gateway Trb245 Firmware | =trb2_r_00.02.02 | |
Teltonika-networks Gateway Trb245 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5769 is a vulnerability in Teltonika firmware TRB2_R_00.02.02 that allows a remote authenticated attacker to conduct persistent cross-site scripting (XSS) attacks.
CVE-2020-5769 affects Teltonika firmware TRB2_R_00.02.02 by allowing a remote authenticated attacker to inject malicious client-side code into the 'URL/Host/Connection' form in the 'DATA TO SERVER' configuration section, leading to persistent cross-site scripting (XSS) attacks.
The severity rating of CVE-2020-5769 is medium with a CVSS score of 5.4.
To fix the CVE-2020-5769 vulnerability, it is recommended to update the Teltonika firmware TRB2_R_00.02.02 to a version that addresses the issue.
More information about CVE-2020-5769 can be found at the following reference: [https://www.tenable.com/security/research/tra-2020-43-0]