Lucene search

K
nessusThis script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.GPON_CVE-2018-10562.NBIN
HistoryDec 19, 2018 - 12:00 a.m.

GPON ONT Home Gateway Router is vulnerable to authenticated remote command execution (CVE-2018-10562)

2018-12-1900:00:00
This script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
75

An issue was discovered in GPON ONT Home Gateway Router web administration interface. Remote Command Execution could be triggered by sending a HTTP POST request to ‘GponForm/diag_Form’ URI with malicious shell script added to dest_host parameter. Because the router saves ping and traceroute command execution results in /tmp and transmits them to the user when the user revisits /diag.html, it’s possible to execute arbitrary commands and retrieve their output.
This allows an attacker to fully control the target device.

Binary data gpon_cve-2018-10562.nbin
VendorProductVersionCPE
dasannetworksgpon_routercpe:/a:dasannetworks:gpon_router