Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29524: n/a

0
Medium
VulnerabilityCVE-2025-29524cvecve-2025-29524
Published: Mon Aug 25 2025 (08/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the component /cgi-bin/system_diagnostic_main.asp of DASAN GPON ONU H660WM H660WMR210825 allows attackers to access sensitive information.

AI-Powered Analysis

AILast updated: 09/02/2025, 01:06:51 UTC

Technical Analysis

CVE-2025-29524 is a medium severity vulnerability identified in the DASAN GPON ONU H660WM and H660WMR210825 devices. The flaw exists in the web management interface component located at /cgi-bin/system_diagnostic_main.asp. Specifically, the vulnerability is due to incorrect access control (CWE-284), which allows unauthenticated remote attackers to access sensitive information without proper authorization. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a moderate risk. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) shows that the attack can be performed remotely over the network without any privileges or user interaction, impacting confidentiality and integrity but not availability. The affected component is a CGI script used for system diagnostics, which likely exposes internal device information or diagnostic data that could aid attackers in further exploitation or reconnaissance. No patches or known exploits in the wild have been reported as of the publication date (August 25, 2025). The vulnerability is particularly concerning because GPON ONUs (Optical Network Units) are critical endpoints in fiber-optic broadband networks, often deployed by ISPs and enterprises to provide high-speed internet access. Unauthorized access to diagnostic information could reveal network configurations, device status, or other sensitive operational data that attackers might leverage to compromise the device or the broader network infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for ISPs, telecom providers, and enterprises relying on DASAN GPON ONU devices for fiber-optic broadband connectivity. Exposure of sensitive diagnostic information could facilitate targeted attacks such as device takeover, network reconnaissance, or lateral movement within corporate or service provider networks. This could lead to breaches of customer data, disruption of internet services, or compromise of critical infrastructure. Given the widespread deployment of GPON technology across Europe for broadband access, exploitation of this vulnerability could affect both private and public sector entities. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the risk of automated scanning and exploitation attempts. While no active exploits are currently known, the vulnerability's presence in network edge devices makes it a valuable target for threat actors aiming to establish persistent footholds or conduct espionage. Additionally, compromised ONUs could be used as pivot points for attacks against other network segments, amplifying the potential damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all DASAN GPON ONU H660WM and H660WMR210825 devices within their networks. Since no official patches are currently available, immediate mitigation steps include restricting access to the device management interfaces by implementing network segmentation and firewall rules that limit access to trusted management networks only. Disabling or restricting access to the vulnerable /cgi-bin/system_diagnostic_main.asp endpoint, if possible, can reduce exposure. Monitoring network traffic for unusual access patterns to the CGI interface can help detect exploitation attempts. Organizations should also engage with DASAN or their equipment vendors to obtain firmware updates or security advisories addressing this issue. Employing strong network access controls, such as VPNs or management VLANs, and enforcing strict authentication for device management interfaces will further reduce risk. Finally, integrating these devices into existing vulnerability management and incident response workflows will ensure timely detection and remediation of any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ac778cad5a09ad004c7853

Added to database: 8/25/2025, 2:47:40 PM

Last enriched: 9/2/2025, 1:06:51 AM

Last updated: 10/19/2025, 11:07:31 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats