Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2023-42495
Disclosure Date: December 13, 2023 (last updated February 25, 2025)
Dasan Networks - W-Web versions 1.22-1.27 - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
0
Attacker Value
Unknown
CVE-2019-9975
Disclosure Date: April 11, 2019 (last updated November 27, 2024)
DASAN H660RM devices with firmware 1.03-0022 use a hard-coded key for logs encryption. Data stored using this key can be decrypted by anyone able to access this key.
0
Attacker Value
Unknown
CVE-2019-9976
Disclosure Date: April 11, 2019 (last updated November 27, 2024)
The Boa server configuration on DASAN H660RM devices with firmware 1.03-0022 logs POST data to the /tmp/boa-temp file, which allows logged-in users to read the credentials of administration web interface users.
0
Attacker Value
Unknown
CVE-2019-9974
Disclosure Date: April 11, 2019 (last updated November 27, 2024)
diag_tool.cgi on DASAN H660RM GPON routers with firmware 1.03-0022 lacks any authorization check, which allows remote attackers to run a ping command via a GET request to enumerate LAN devices or crash the router with a DoS attack.
0
Attacker Value
Unknown
CVE-2019-8950
Disclosure Date: February 20, 2019 (last updated November 27, 2024)
The backdoor account dnsekakf2$$ in /bin/login on DASAN H665 devices with firmware 1.46p1-0028 allows an attacker to login to the admin account via TELNET.
0
Attacker Value
Unknown
CVE-2018-17867
Disclosure Date: October 01, 2018 (last updated November 27, 2024)
The Port Forwarding functionality on DASAN H660GW devices allows remote attackers to execute arbitrary code via shell metacharacters in the cgi-bin/adv_nat_virsvr.asp Addr parameter (aka the Local IP Address field).
0
Attacker Value
Unknown
CVE-2018-10562
Disclosure Date: May 04, 2018 (last updated January 24, 2025)
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
0
Attacker Value
Unknown
CVE-2018-10561
Disclosure Date: May 04, 2018 (last updated January 24, 2025)
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
0
Attacker Value
Unknown
CVE-2017-18046
Disclosure Date: January 21, 2018 (last updated November 26, 2024)
Buffer overflow on Dasan GPON ONT WiFi Router H640X 12.02-01121 2.77p1-1124 and 3.03p2-1146 devices allows remote attackers to execute arbitrary code via a long POST request to the login_action function in /cgi-bin/login_action.cgi (aka cgipage.cgi).
0