cvelist/2018/10xxx/CVE-2018-10561.json

73 lines
2.0 KiB
JSON
Raw Normal View History

2018-04-30 10:05:10 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-10561",
2018-05-03 23:02:52 -04:00
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
2018-04-30 10:05:10 -04:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2018-05-03 23:02:52 -04:00
"value" : "An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending \"?images\" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
2018-05-05 06:02:36 -04:00
{
"name" : "44576",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44576/"
},
2018-05-03 23:02:52 -04:00
{
"name" : "https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/",
"refsource" : "MISC",
"url" : "https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/"
2019-02-19 06:04:20 -05:00
},
{
"name" : "107053",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/107053"
2018-04-30 10:05:10 -04:00
}
]
}
}