Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote malicious user to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco catalyst_pon_switch_cgp-ont-1p_firmware |
||
cisco catalyst_pon_switch_cgp-ont-4p_firmware |
||
cisco catalyst_pon_switch_cgp-ont-4pvc_firmware |
||
cisco catalyst_pon_switch_cgp-ont-4tvcw_firmware |
||
cisco catalyst_pon_switch_cgp-ont-4pv_firmware |