Описание
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
Ссылки
- Broken LinkThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitTechnical DescriptionThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitTechnical DescriptionThird Party Advisory
- US Government Resource
Уязвимые конфигурации
Одновременно
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
Уязимость микропрограммного обеспечения маршрутизатора Dasan GPON, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить полный контроль над устройством
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2