mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-08 06:06:44 +02:00
1.7 KiB
1.7 KiB
CVE-2018-10561
Description
An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.
POC
Reference
Github
- https://github.com/0x0d3ad/Kn0ck
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ATpiu/CVE-2018-10562
- https://github.com/EvilAnne/Python_Learn
- https://github.com/ExiaHan/GPON
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Prodject/Kn0ck
- https://github.com/Truongnn92/GPON
- https://github.com/duggytuxy/malicious_ip_addresses
- https://github.com/ethicalhackeragnidhra/GPON
- https://github.com/f3d0x0/GPON
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/lnick2023/nicenice
- https://github.com/manyunya/GPON
- https://github.com/oneplus-x/Sn1per
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/samba234/Sniper
- https://github.com/underattack-today/underattack-py
- https://github.com/unusualwork/Sn1per
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuguowong/Mirai-MAL