vendor:
ZHONE ZNID GPON 2426A (24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
by:
Lyon Yang
7,5
CVSS
HIGH
Stack-based buffer overflow
N/A
CWE
Product Name: ZHONE ZNID GPON 2426A (24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
Affected Version From: < S3.0.501
Affected Version To: S3.1.241
Patch Exists: YES
Related CWE: N/A
CPE: h:zhone:znid_gpon_2426a
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015
Multiple Remote Code Execution found in ZHONE
ZHONE RGW is vulnerable to stack-based buffer overflow attacks due to the use of unsafe string functions without sufficient input validation in the httpd binary. Two exploitable conditions were discovered when requesting a large (7000) character filename ending in .cgi, .tst, .html, .cmd, .conf, .txt and .wl, in GET or POST requests. Vantage Point has developed working code execution exploits for these issues.
Mitigation:
Upgrade to version S3.1.241