ID

VAR-201707-0931


CVE

CVE-2017-8116


TITLE

Teltonika RUT9XX In the router firmware management interface root Vulnerability to execute arbitrary commands with privileges

Trust: 0.8

sources: JVNDB: JVNDB-2017-006076

DESCRIPTION

The management interface for the Teltonika RUT9XX routers (aka LuCI) with firmware 00.03.265 and earlier allows remote attackers to execute arbitrary commands with root privileges via shell metacharacters in the username parameter in a login request. TeltonikaRUT9XXrouters (also known as LuCI) is a router product from Teltonika, Lithuania. A security vulnerability exists in the management interface in the TeltonikaRUT9XX router using firmware 0.03.265 and earlier. Teltonika Routers are prone to a remote command-execution vulnerability because it fails to properly sanitize user-supplied input. This may aid in further attacks

Trust: 2.61

sources: NVD: CVE-2017-8116 // JVNDB: JVNDB-2017-006076 // CNVD: CNVD-2017-13830 // BID: 100978 // VULHUB: VHN-116319 // VULMON: CVE-2017-8116

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-13830

AFFECTED PRODUCTS

vendor:teltonikamodel:rut900scope:lteversion:00.03.265

Trust: 1.8

vendor:teltonikamodel:rut905scope:lteversion:00.03.265

Trust: 1.8

vendor:teltonikamodel:rut950scope:lteversion:00.03.265

Trust: 1.8

vendor:teltonikamodel:rut955scope:lteversion:00.03.265

Trust: 1.8

vendor:teltonikamodel:rut9xx routersscope:ltversion:00.03.265

Trust: 0.6

vendor:teltonikamodel:rut950scope:eqversion:00.03.265

Trust: 0.6

vendor:teltonikamodel:rut955scope:eqversion:00.03.265

Trust: 0.6

vendor:teltonikamodel:rut905scope:eqversion:00.03.265

Trust: 0.6

vendor:teltonikamodel:rut900scope:eqversion:00.03.265

Trust: 0.6

vendor:teltonikamodel:rut905scope:eqversion:0.3.265

Trust: 0.3

vendor:teltonikamodel:rut905scope:eqversion:0

Trust: 0.3

vendor:teltonikamodel:rut900scope:eqversion:0.3.265

Trust: 0.3

vendor:teltonikamodel:rut900scope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2017-13830 // BID: 100978 // JVNDB: JVNDB-2017-006076 // CNNVD: CNNVD-201707-060 // NVD: CVE-2017-8116

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-8116
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-8116
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-13830
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201707-060
value: CRITICAL

Trust: 0.6

VULHUB: VHN-116319
value: HIGH

Trust: 0.1

VULMON: CVE-2017-8116
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-8116
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-13830
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-116319
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-8116
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-13830 // VULHUB: VHN-116319 // VULMON: CVE-2017-8116 // JVNDB: JVNDB-2017-006076 // CNNVD: CNNVD-201707-060 // NVD: CVE-2017-8116

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-116319 // JVNDB: JVNDB-2017-006076 // NVD: CVE-2017-8116

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201707-060

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201707-060

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006076

PATCH

title:Top Pageurl:http://teltonika.lt/

Trust: 0.8

title:TeltonikaRUT9XX router arbitrary command execution vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/97827

Trust: 0.6

title:Teltonika RUT9XX Repair measures for router security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71397

Trust: 0.6

sources: CNVD: CNVD-2017-13830 // JVNDB: JVNDB-2017-006076 // CNNVD: CNNVD-201707-060

EXTERNAL IDS

db:NVDid:CVE-2017-8116

Trust: 3.5

db:JVNDBid:JVNDB-2017-006076

Trust: 0.8

db:CNNVDid:CNNVD-201707-060

Trust: 0.7

db:CNVDid:CNVD-2017-13830

Trust: 0.6

db:BIDid:100978

Trust: 0.5

db:VULHUBid:VHN-116319

Trust: 0.1

db:VULMONid:CVE-2017-8116

Trust: 0.1

sources: CNVD: CNVD-2017-13830 // VULHUB: VHN-116319 // VULMON: CVE-2017-8116 // BID: 100978 // JVNDB: JVNDB-2017-006076 // CNNVD: CNNVD-201707-060 // NVD: CVE-2017-8116

REFERENCES

url:https://github.com/nettitude/metasploit-modules/blob/master/teltonika_add_user.rb

Trust: 3.2

url:https://labs.nettitude.com/blog/cve-2017-8116-teltonika-router-unauthenticated-remote-code-execution/

Trust: 2.9

url:https://github.com/nettitude/metasploit-modules/blob/master/teltonika_cmd_exec.rb

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8116

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-8116

Trust: 0.8

url:http://teltonika.lt/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://www.securityfocus.com/bid/100978

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2017-13830 // VULHUB: VHN-116319 // VULMON: CVE-2017-8116 // BID: 100978 // JVNDB: JVNDB-2017-006076 // CNNVD: CNNVD-201707-060 // NVD: CVE-2017-8116

CREDITS

Nettitude

Trust: 0.3

sources: BID: 100978

SOURCES

db:CNVDid:CNVD-2017-13830
db:VULHUBid:VHN-116319
db:VULMONid:CVE-2017-8116
db:BIDid:100978
db:JVNDBid:JVNDB-2017-006076
db:CNNVDid:CNNVD-201707-060
db:NVDid:CVE-2017-8116

LAST UPDATE DATE

2025-04-20T23:23:43.009000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-13830date:2017-07-11T00:00:00
db:VULHUBid:VHN-116319date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-8116date:2019-10-03T00:00:00
db:BIDid:100978date:2017-07-03T00:00:00
db:JVNDBid:JVNDB-2017-006076date:2017-08-17T00:00:00
db:CNNVDid:CNNVD-201707-060date:2019-10-23T00:00:00
db:NVDid:CVE-2017-8116date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-13830date:2017-07-11T00:00:00
db:VULHUBid:VHN-116319date:2017-07-03T00:00:00
db:VULMONid:CVE-2017-8116date:2017-07-03T00:00:00
db:BIDid:100978date:2017-07-03T00:00:00
db:JVNDBid:JVNDB-2017-006076date:2017-08-17T00:00:00
db:CNNVDid:CNNVD-201707-060date:2017-07-05T00:00:00
db:NVDid:CVE-2017-8116date:2017-07-03T16:29:00.557