First published: Fri May 04 2018(Updated: )
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dasan Networks GPON Router Firmware | ||
Dasan Networks GPON Router Firmware | ||
All of | ||
Dasan Networks GPON Router Firmware | ||
Dasan Networks GPON Router Firmware | ||
Dasan Networks GPON Router Firmware | ||
All of | ||
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-10561 is classified as a critical vulnerability due to its potential to allow unauthorized access to the device.
To fix CVE-2018-10561, update the Dasan GPON router firmware to the latest version provided by the vendor.
CVE-2018-10561 affects Dasan Networks GPON routers that have the vulnerable firmware installed.
CVE-2018-10561 impacts device security by allowing attackers to bypass authentication, gaining unauthorized access to device controls.
The exploit method for CVE-2018-10561 involves appending '?images' to URLs that require authentication to access the router's management interface.