CVE-2018-10561

Published May 4, 2018

Last updated 3 days ago

Overview

Description
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Dasan GPON Routers Authentication Bypass Vulnerability
Exploit added on
Mar 31, 2022
Exploit action due
Apr 21, 2022
Required action
The impacted product is end-of-life and should be disconnected if still in use.

Weaknesses

nvd@nist.gov
CWE-287

Social media

Hype score
Not currently trending

Configurations