RULE(RULE ID:324276)

Rule General Information
Release Date: 2020-01-21
Rule Name: GPON Routers Command Injection Vulnerability (CVE-2018-10562)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Network Device
Reference: SecurityFocusBID:107053
ExploitDB:44576
https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.dasannetworks.com