CVE-2025-29525

5.3 MEDIUM

📋 TL;DR

DASAN GPON ONU H660WM devices contain hardcoded default credentials in their control panel, allowing attackers to gain administrative access. This affects users of the specific hardware and firmware versions who haven't changed the default credentials. The vulnerability enables unauthorized control over the modem's configuration and network settings.

💻 Affected Systems

Products:
  • DASAN GPON ONU H660WM
Versions: OS version H660WMR210825
Operating Systems: Embedded OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the specific hardware version DS-E5-583-A1 and firmware version H660WMR210825 that haven't had default credentials changed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control, enabling network traffic interception, device reconfiguration for malicious purposes, or using the device as an entry point into the internal network.

🟠

Likely Case

Unauthorized users access the control panel to modify network settings, change passwords, or disrupt internet connectivity for affected users.

🟢

If Mitigated

If credentials are changed from defaults, the vulnerability is effectively neutralized with minimal operational impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the default credentials, which may be publicly documented or easily guessable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Change default credentials immediately as a mitigation.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change the default administrative credentials to strong, unique passwords.

Access control panel via web interface and navigate to administration/security settings to change password

Network Segmentation

all

Isolate affected devices on separate network segments to limit potential lateral movement.

🧯 If You Can't Patch

  • Change all default credentials immediately
  • Restrict network access to control panel interface
  • Monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to log into the device's web control panel using default credentials (check device documentation or common defaults like admin/admin).

Check Version:

Check device web interface or console for firmware version H660WMR210825 and hardware version DS-E5-583-A1

Verify Fix Applied:

Verify that default credentials no longer work and only your changed credentials provide access.

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful login with default credentials
  • Configuration changes from unknown IP addresses

Network Indicators:

  • Unusual traffic patterns from the modem
  • External connections to the modem's administrative interface

SIEM Query:

source="modem_logs" AND (event="login_success" AND user="admin") OR (event="config_change" AND source_ip!=internal_range)

🔗 References

📤 Share & Export