Vulnerabilities > Dasanzhone
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-11-21 | CVE-2014-8356 | Authorization Bypass Through User-Controlled Key vulnerability in Dasanzhone Znid 2426A Firmware The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference. | 8.8 |
2019-09-05 | CVE-2019-10677 | Cross-site Scripting vulnerability in Dasanzhone Znid Gpon 2426A EU Firmware S3.1.285 Multiple Cross-Site Scripting (XSS) issues in the web interface on DASAN Zhone ZNID GPON 2426A EU version S3.1.285 devices allow a remote attacker to execute arbitrary JavaScript via manipulation of an unsanitized GET parameter: /zhndnsdisplay.cmd (name), /wlsecrefresh.wl (wlWscCfgMethod, wl_wsc_reg). | 6.1 |
2017-10-17 | CVE-2014-9118 | Command Injection vulnerability in Dasanzhone Znid 2426A Firmware The web administrative portal in Zhone zNID GPON 2426A before S3.0.501 allows remote attackers to execute arbitrary commands via shell metacharacters in the ipAddr parameter to zhnping.cmd. | 8.8 |
2017-10-17 | CVE-2014-8357 | Credentials Management vulnerability in Dasanzhone Znid 2426A Firmware backupsettings.html in the web administrative portal in Zhone zNID GPON 2426A before S3.0.501 places a session key in a URL, which allows remote attackers to obtain arbitrary user passwords via the sessionKey parameter in a getConfig action to backupsettings.conf. | 8.8 |