CVE-2025-29524

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass access controls on DASAN GPON ONU H660WM devices, exposing sensitive system information through the /cgi-bin/system_diagnostic_main.asp endpoint. Attackers can retrieve diagnostic data without proper authentication. This affects organizations using these specific GPON ONU devices.

💻 Affected Systems

Products:
  • DASAN GPON ONU H660WM
Versions: H660WMR210825
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web interface exposed to network are vulnerable. The vulnerability exists in the diagnostic component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to device configuration, credentials, network topology, and can pivot to internal networks, potentially leading to complete network compromise.

🟠

Likely Case

Unauthenticated attackers access sensitive diagnostic information including system logs, configuration details, and network settings that could facilitate further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure from the specific device only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device's web interface. No authentication needed to access the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NOT AVAILABLE

Restart Required: No

Instructions:

Check with DASAN Networks for firmware updates. No official patch information available at this time.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate GPON ONU devices from untrusted networks and restrict access to management interfaces.

Configure firewall rules to block external access to port 80/443 on ONU devices
Implement VLAN segmentation for management traffic

Access Control Lists

all

Restrict access to the web management interface to authorized IP addresses only.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Disable remote management interface if not required
  • Implement network monitoring for unauthorized access attempts to the diagnostic endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[device_ip]/cgi-bin/system_diagnostic_main.asp without authentication. If diagnostic information is returned, device is vulnerable.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

After applying workarounds, verify that access to the diagnostic endpoint is properly restricted and requires authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to /cgi-bin/system_diagnostic_main.asp
  • Multiple failed authentication attempts followed by diagnostic access

Network Indicators:

  • HTTP GET requests to /cgi-bin/system_diagnostic_main.asp from unauthorized sources
  • Unusual traffic patterns to ONU management interfaces

SIEM Query:

source="*" AND (url="/cgi-bin/system_diagnostic_main.asp" OR uri="/cgi-bin/system_diagnostic_main.asp")

🔗 References

📤 Share & Export