CVE-2025-29525: n/a
DASAN GPON ONU H660WM OS version H660WMR210825 Hardware version DS-E5-583-A1 was discovered to contain insecure default credentials in the modem's control panel.
AI Analysis
Technical Summary
CVE-2025-29525 is a medium-severity vulnerability identified in the DASAN GPON ONU H660WM device, specifically in OS version H660WMR210825 and hardware version DS-E5-583-A1. The vulnerability arises from the presence of insecure default credentials in the modem's control panel. This means that the device is shipped or configured with default usernames and passwords that are either well-known or easily guessable, and these credentials have not been changed by the end user or service provider. The vulnerability is classified under CWE-1392, which relates to the use of insecure default credentials. According to the CVSS v3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), the attack vector is network-based (remote), requires no privileges, no user interaction, and has low attack complexity. The impact is limited to confidentiality, with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability allows an attacker with network access to the device to potentially gain unauthorized read-only access to certain information via the control panel, which could include configuration details or network-related data. However, the lack of impact on integrity or availability limits the scope of damage. The device affected is a GPON ONU (Gigabit-capable Passive Optical Network Optical Network Unit), a common type of fiber optic modem used by ISPs to provide broadband internet access to end users. This device is typically deployed in residential or small business environments to terminate fiber optic lines and provide network connectivity.
Potential Impact
For European organizations, the presence of insecure default credentials in widely deployed GPON ONU devices poses a risk primarily to confidentiality. Attackers who gain network access to these devices could harvest sensitive configuration information or network details, which could be leveraged for further attacks such as network reconnaissance or lateral movement. Although the vulnerability does not directly affect integrity or availability, the exposure of sensitive information could facilitate targeted attacks against organizational infrastructure. In environments where these devices are deployed at scale, such as ISPs serving European customers or enterprises using these modems for fiber connectivity, the risk is amplified. Additionally, compromised devices could be used as entry points into internal networks if proper network segmentation is not enforced. The lack of required authentication or user interaction makes exploitation easier for remote attackers with network access. However, the medium severity rating reflects the limited scope of impact. The absence of known exploits in the wild suggests that exploitation is not yet widespread, but the vulnerability should be addressed proactively to prevent potential abuse.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations and ISPs should take the following specific actions: 1) Immediately audit all DASAN GPON ONU H660WM devices in their networks to identify units running the affected OS and hardware versions. 2) Change all default credentials on these devices to strong, unique passwords that comply with organizational password policies. 3) Implement network segmentation to isolate GPON ONU devices from critical internal systems, limiting the potential impact of any compromise. 4) Restrict management interface access to trusted IP addresses or management VLANs only, preventing unauthorized remote access. 5) Monitor network traffic for unusual access patterns or attempts to connect to the control panel interfaces of these devices. 6) Engage with DASAN or device vendors to obtain firmware updates or patches addressing this vulnerability once available, and plan for timely deployment. 7) Educate network administrators and field technicians about the risks of default credentials and enforce procedures to change them during device provisioning. 8) Consider deploying intrusion detection or prevention systems capable of identifying attempts to exploit default credential vulnerabilities on network devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-29525: n/a
Description
DASAN GPON ONU H660WM OS version H660WMR210825 Hardware version DS-E5-583-A1 was discovered to contain insecure default credentials in the modem's control panel.
AI-Powered Analysis
Technical Analysis
CVE-2025-29525 is a medium-severity vulnerability identified in the DASAN GPON ONU H660WM device, specifically in OS version H660WMR210825 and hardware version DS-E5-583-A1. The vulnerability arises from the presence of insecure default credentials in the modem's control panel. This means that the device is shipped or configured with default usernames and passwords that are either well-known or easily guessable, and these credentials have not been changed by the end user or service provider. The vulnerability is classified under CWE-1392, which relates to the use of insecure default credentials. According to the CVSS v3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), the attack vector is network-based (remote), requires no privileges, no user interaction, and has low attack complexity. The impact is limited to confidentiality, with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability allows an attacker with network access to the device to potentially gain unauthorized read-only access to certain information via the control panel, which could include configuration details or network-related data. However, the lack of impact on integrity or availability limits the scope of damage. The device affected is a GPON ONU (Gigabit-capable Passive Optical Network Optical Network Unit), a common type of fiber optic modem used by ISPs to provide broadband internet access to end users. This device is typically deployed in residential or small business environments to terminate fiber optic lines and provide network connectivity.
Potential Impact
For European organizations, the presence of insecure default credentials in widely deployed GPON ONU devices poses a risk primarily to confidentiality. Attackers who gain network access to these devices could harvest sensitive configuration information or network details, which could be leveraged for further attacks such as network reconnaissance or lateral movement. Although the vulnerability does not directly affect integrity or availability, the exposure of sensitive information could facilitate targeted attacks against organizational infrastructure. In environments where these devices are deployed at scale, such as ISPs serving European customers or enterprises using these modems for fiber connectivity, the risk is amplified. Additionally, compromised devices could be used as entry points into internal networks if proper network segmentation is not enforced. The lack of required authentication or user interaction makes exploitation easier for remote attackers with network access. However, the medium severity rating reflects the limited scope of impact. The absence of known exploits in the wild suggests that exploitation is not yet widespread, but the vulnerability should be addressed proactively to prevent potential abuse.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations and ISPs should take the following specific actions: 1) Immediately audit all DASAN GPON ONU H660WM devices in their networks to identify units running the affected OS and hardware versions. 2) Change all default credentials on these devices to strong, unique passwords that comply with organizational password policies. 3) Implement network segmentation to isolate GPON ONU devices from critical internal systems, limiting the potential impact of any compromise. 4) Restrict management interface access to trusted IP addresses or management VLANs only, preventing unauthorized remote access. 5) Monitor network traffic for unusual access patterns or attempts to connect to the control panel interfaces of these devices. 6) Engage with DASAN or device vendors to obtain firmware updates or patches addressing this vulnerability once available, and plan for timely deployment. 7) Educate network administrators and field technicians about the risks of default credentials and enforce procedures to change them during device provisioning. 8) Consider deploying intrusion detection or prevention systems capable of identifying attempts to exploit default credential vulnerabilities on network devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ac778cad5a09ad004c7856
Added to database: 8/25/2025, 2:47:40 PM
Last enriched: 9/2/2025, 1:07:02 AM
Last updated: 10/20/2025, 6:37:41 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62577: Incorrect default permissions in Fsas Technologies Inc. ETERNUS SF AdvancedCopy Manager Standard Edition (for Solaris 10/ 11)
HighCVE-2025-11948: CWE-434 Unrestricted Upload of File with Dangerous Type in Excellent Infotek Document Management System
CriticalCVE-2025-11947: Heap-based Buffer Overflow in bftpd
LowCVE-2025-11946: Cross Site Scripting in LogicalDOC Community Edition
MediumCVE-2025-11945: Cross Site Scripting in toeverything AFFiNE
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.