First published: Sun Jan 21 2018(Updated: )
Buffer overflow on Dasan GPON ONT WiFi Router H640X 12.02-01121 2.77p1-1124 and 3.03p2-1146 devices allows remote attackers to execute arbitrary code via a long POST request to the login_action function in /cgi-bin/login_action.cgi (aka cgipage.cgi).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dasannetworks H640x Firmware | =2.77p1-1124 | |
Dasannetworks H640x Firmware | =3.03p2-1146 | |
Dasannetworks H640x Firmware | =12.02-01121 | |
Dasannetworks H640x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18046 is considered a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2017-18046, update the firmware of the Dasan GPON ONT WiFi Router H640X to a version that does not contain the buffer overflow vulnerability.
CVE-2017-18046 affects Dasan GPON ONT WiFi Router H640X devices running firmware versions 2.77p1-1124, 3.03p2-1146, and 12.02-01121.
CVE-2017-18046 can be exploited through a long POST request to the login_action function in the router's CGI scripts.
A practical workaround for CVE-2017-18046 includes disabling remote management features on the Dasan GPON ONT WiFi Router H640X.