Количество 3
Количество 3
CVE-2018-10561
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
GHSA-9f5c-v3c9-rfhg
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
BDU:2019-01221
Уязимость микропрограммного обеспечения маршрутизатора Dasan GPON, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить полный контроль над устройством
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-10561 An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device. | CVSS3: 9.8 | 93% Критический | почти 8 лет назад | |
GHSA-9f5c-v3c9-rfhg An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device. | CVSS3: 9.8 | 93% Критический | больше 3 лет назад | |
BDU:2019-01221 Уязимость микропрограммного обеспечения маршрутизатора Dasan GPON, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить полный контроль над устройством | CVSS3: 9.8 | 93% Критический | почти 8 лет назад |
Уязвимостей на страницу