|
|||
Rule General Information |
---|
Release Date: | 2020-01-21 | |
Rule Name: | GPON Routers Command Injection Vulnerability (CVE-2018-10562) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Network Device | |
Reference: | SecurityFocusBID:107053 ExploitDB:44576 https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/ |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.dasannetworks.com |