Commit Graph

6 Commits (3ea9db5a8bd14ae4d82545814944b366b33da737)

Author SHA1 Message Date
MostInterestingBotInTheWorld e547884d41 Enhancement: cves/2018/CVE-2018-10562.yaml by mp 2022-05-12 15:42:18 -04:00
MostInterestingBotInTheWorld 4898a7f066 Enhancement: cves/2018/CVE-2018-10562.yaml by mp 2022-05-12 14:14:20 -04:00
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
Prince Chaddha 66a27e4da0
Update CVE-2018-10562.yaml 2022-04-05 12:18:20 +05:30
Prince Chaddha 02a1d0ce06
Update CVE-2018-10562.yaml 2022-04-05 12:13:12 +05:30
GwanYeong Kim 21a3ce4f12 Create CVE-2018-10562.yaml
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-02 23:56:35 +09:00