8.8
CWE
15
Advisory Published
Updated

CVE-2023-32349

First published: Mon May 22 2023(Updated: )

Version 00.07.03.4 and prior of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Teltonika Remote Management System (RMS): Versions prior to 4.10.0 (affected by CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588)
Teltonika Remote Management System (RMS): Versions prior to 4.14.0 (affected by CVE-2023-2586)
Teltonika RUT model routers: Version 00.07.00 through 00.07.03.4 (affected by CVE-2023-32349)
Teltonika RUT model routers: Version 00.07.00 through 00.07.03 (affected by CVE-2023-32350)
Teltonika Networks RUT200 Firmware<=00.07.03.4
Teltonika Networks RUT200
Teltonika Networks RUT240 Firmware<=00.07.03.4
Teltonika Networks RUT240
Teltonika RUT241 Firmware<=00.07.03.4
Teltonika Networks RUT241
teltonika-networks rut300 firmware<=00.07.03.4
teltonika-networks rut300 firmware
Teltonika Networks RUT360<=00.07.03.4
Teltonika Networks RUT360
Teltonika Networks RUT901 Firmware<=00.07.03.4
Teltonika Networks RUT901 Firmware
Teltonika Networks RUT950<=00.07.03.4
Teltonika Networks RUT950
Teltonika Networks RUT951<=00.07.03.4
Teltonika Networks RUT951
teltonika-networks rut955 firmware<=00.07.03.4
teltonika-networks rut955 firmware
teltonika-networks rut956 firmware<=00.07.03.4
teltonika-networks rut956 firmware
Teltonika Networks RUTX08 Firmware<=00.07.03.4
Teltonika Networks RUTX08 Firmware
teltonika-networks rutx09<=00.07.03.4
Teltonika Networks RUTX09 Firmware
Teltonika Networks RUTX10<=00.07.03.4
Teltonika Networks RUTX10
Teltonika Networks RUTX11<=00.07.03.4
Teltonika Networks RUTX11
teltonika-networks rutx12 firmware<=00.07.03.4
Teltonika Networks RUTX12
teltonika-networks rutx14>=00.07.00<=00.07.03.4
Teltonika Networks RUTX14
teltonika-networks rutx50 firmware>=00.07.00<=00.07.03.4
Teltonika Networks RUTX50
Teltonika Networks RUTXR1 Firmware>=00.07.00<=00.07.03.4
Teltonika Networks RUTXR1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-32349?

    CVE-2023-32349 is a vulnerability in Teltonika’s RUT router firmware versions 00.07.03.4 and prior that allows an authenticated attacker to use an exposed UCI configuration file to execute arbitrary commands and potentially gain unauthorized access to the system.

  • What is the severity of CVE-2023-32349?

    The severity of CVE-2023-32349 is high, with a CVSS score of 8.8.

  • How can an attacker exploit CVE-2023-32349?

    An authenticated attacker can exploit CVE-2023-32349 by using the exposed UCI configuration file to execute arbitrary commands and gain unauthorized access to the system.

  • Which Teltonika router firmware versions are affected by CVE-2023-32349?

    Teltonika’s RUT router firmware versions 00.07.03.4 and prior are affected by CVE-2023-32349.

  • Is Teltonika-networks Rut200 vulnerable to CVE-2023-32349?

    No, Teltonika-networks Rut200 is not vulnerable to CVE-2023-32349.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203