First published: Fri May 04 2018(Updated: )
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dasan Networks GPON Router Firmware | ||
Dasan Networks GPON Router Firmware | ||
Dasan Networks GPON Router Firmware | ||
All of | ||
Dasan Networks GPON Router Firmware | ||
Dasan Networks GPON Router Firmware | ||
All of | ||
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-10562 is considered a high severity vulnerability due to the potential for command injection.
To fix CVE-2018-10562, update the firmware of the Dasan Networks GPON router to the latest version provided by the manufacturer.
CVE-2018-10562 specifically affects Dasan Networks GPON home routers.
Exploitation of CVE-2018-10562 can allow attackers to execute arbitrary commands on the affected router, potentially compromising the network's security.
Not all Dasan GPON routers are vulnerable; the vulnerability specifically affects certain firmware versions.