← Back to CVEs
CVE-2018-10561
CRITICALCISA KEV9.8
Description
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/4/2018
Last Modified11/5/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorDasan
ProductGigabit Passive Optical Network (GPON) Routers
Vulnerability NameDasan GPON Routers Authentication Bypass Vulnerability
KEV Date Added2022-03-31
Remediation Due Date2022-04-21
Ransomware UseUnknown
Affected Products
dasannetworks:gpon_routerdasannetworks:gpon_router_firmware
Weaknesses (CWE)
CWE-287CWE-287
References
http://www.securityfocus.com/bid/107053(cve@mitre.org)
https://www.exploit-db.com/exploits/44576/(cve@mitre.org)
http://www.securityfocus.com/bid/107053(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44576/(af854a3a-2127-422b-91ae-364da2661108)
https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-10561(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.