Vulnerability Description
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Teltonika-Networks | Trb245 Firmware | 00.02.04.03 |
| Teltonika-Networks | Trb245 | - |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2020-57ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2020-57ExploitThird Party Advisory
FAQ
What is CVE-2020-5786?
CVE-2020-5786 is a vulnerability with a CVSS score of 8.8 (HIGH). Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
How severe is CVE-2020-5786?
CVE-2020-5786 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5786?
Check the references section above for vendor advisories and patch information. Affected products include: Teltonika-Networks Trb245 Firmware, Teltonika-Networks Trb245.