Lucene search

K
nessusThis script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.GPON_CVE-2018-10561.NBIN
HistoryDec 19, 2018 - 12:00 a.m.

GPON ONT Home Gateway Router is vulnerable to authentication bypass (CVE-2018-10561)

2018-12-1900:00:00
This script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
761

An issue was discovered in GPON ONT Home Gateway Router web administration interface. It is possible to bypass authentication of web interface by using the following approach:

  • http(s)://<Router IP>/<some file>?images/
  • http(s)://<Router IP>/<some file>?style/
  • http(s)://<Router IP>/<some file>?script/
  • http(s)://<Router IP>/images/…/<some file>
  • http(s)://<Router IP>/style/…/<some file>
  • http(s)://<Router IP>/script/…/<some file> For example, β€˜/menu.html?images/’ or β€˜/GponForm/diag_FORM?images/’ URI.
    This allows an attacker to fully control the target device.
Binary data gpon_cve-2018-10561.nbin
VendorProductVersionCPE
dasannetworksgpon_routercpe:/a:dasannetworks:gpon_router