Lucene search

K
nessusThis script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.GPON_CVE-2019-3919.NBIN
HistoryMar 25, 2019 - 12:00 a.m.

GPON ONT Home Gateway Authenticated Remote Command Execution (CVE-2019-3919)

2019-03-2500:00:00
This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
513

An issue was discovered in GPON ONT Home Gateway Router web administration interface. A remote command execution vulnerability exists in /GponForm/usb_restore_Form?script/ component due to insufficient input validation. An authenticated, remote attacker can exploit this to escalate their permissions level and execute arbitrary commands with root privileges.
Note that Nessus has authenticated to GPON Home Gateway web interface by using supplied credentials or utilized an authentication bypass (CVE-2018-10561) issue in order to exploit this vulnerability.

Binary data gpon_cve-2019-3919.nbin
VendorProductVersionCPE
dasannetworksgpon_routercpe:/a:dasannetworks:gpon_router