Vulnerabilities > Teltonika Networks > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-10-01 | CVE-2020-5789 | Path Traversal vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.03 Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated attacker to read the contents of arbitrary files on disk. | 4.0 |
2020-10-01 | CVE-2020-5786 | Cross-Site Request Forgery (CSRF) vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.03 Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link. | 6.8 |
2020-10-01 | CVE-2020-5785 | Cross-site Scripting vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.03 Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.04.3 allows an unauthenticated attacker to conduct reflected cross-site scripting via a crafted ‘action’ or ‘pkg_name’ parameter. | 4.3 |
2020-10-01 | CVE-2020-5784 | Server-Side Request Forgery (SSRF) vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.03 Server-Side Request Forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a low privileged user to cause the application to perform HTTP GET requests to arbitrary URLs. | 4.0 |
2020-08-03 | CVE-2020-5773 | Improper Privilege Management vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.01 Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations. | 6.5 |
2020-08-03 | CVE-2020-5770 | Cross-Site Request Forgery (CSRF) vulnerability in Teltonika-Networks Trb245 Firmware 00.02.04.01 Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.01 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link. | 6.8 |