'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2018-05-15 | |
| Rule Name: | Dasan GPON Authorization Bypass Vulnerability (CVE-2018-10561) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device. | |
| Impact: | An attacker can exploit these issues to bypass authentication or execute arbitrary commands in the context of the affected device. | |
| Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
| Reference: | SecurityFocusBID:107053 ExploitDB:44576 https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/ |
|
| Solutions |
|---|
| The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.dasannetworks.com |