Логотип exploitDog
bind:CVE-2023-2588
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-2588

Количество 3

Количество 3

nvd логотип

CVE-2023-2588

больше 2 лет назад

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-vrmh-4mwf-2jxm

больше 2 лет назад

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-03059

больше 2 лет назад

Уязвимость системы удаленного управления промышленными роутерами Teltonika RMS (Remote Management System), связанная с включением web-функции из недостоверного источника, позволяющая нарушителю раскрыть защищаемую информацию, а так же выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-2588

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-vrmh-4mwf-2jxm

Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03059

Уязвимость системы удаленного управления промышленными роутерами Teltonika RMS (Remote Management System), связанная с включением web-функции из недостоверного источника, позволяющая нарушителю раскрыть защищаемую информацию, а так же выполнить произвольный код

CVSS3: 8.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу