Lucene search

K
nessusThis script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.GPON_CVE-2019-3920.NBIN
HistoryMar 28, 2019 - 12:00 a.m.

GPON ONT Home Gateway Authenticated Remote Command Execution (CVE-2019-3920)

2019-03-2800:00:00
This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
95

An issue was discovered in GPON ONT Home Gateway web administration interface. A remote command execution vulnerability exists in /GponForm/device_Form?script/ component due to insufficient input validation. An authenticated, remote attacker can exploit this to escalate their permissions level and execute arbitrary commands with root privileges.

Note that Nessus has authenticated to GPON Home Gateway web interface by using supplied credentials or utilized an authentication bypass (CVE-2018-10561) issue in order to exploit this vulnerability.

Binary data gpon_cve-2019-3920.nbin
VendorProductVersionCPE
dasannetworksgpon_routercpe:/a:dasannetworks:gpon_router