Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vrmh-4mwf-2jxm

Опубликовано: 06 июл. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

EPSS

Процентиль: 61%
0.00414
Низкий

8.8 High

CVSS3

Дефекты

CWE-830

Связанные уязвимости

CVSS3: 8.8
nvd
больше 2 лет назад

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость системы удаленного управления промышленными роутерами Teltonika RMS (Remote Management System), связанная с включением web-функции из недостоверного источника, позволяющая нарушителю раскрыть защищаемую информацию, а так же выполнить произвольный код

EPSS

Процентиль: 61%
0.00414
Низкий

8.8 High

CVSS3

Дефекты

CWE-830