Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
ZHONE ZNID GPON Multiple Vulnerabilities
Information
Severity
Severity
Critical
Family
Family
Buffer overflow
CVSSv2 Base
CVSSv2 Base
9.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:S/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
8 years ago
Modified
Modified
5 years ago
Summary
ZHONE RGW is vulnerable to stack-based buffer overflow attacks.
Insight
Insight
This vulnerability is due to the use of unsafe string functions without sufficient input validation in the httpd binary.
Affected Software
Affected Software
Model: ZHONE ZNID GPON 2426A (24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models) < S3.0.501
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to version S3.1.241