dasannetworks CVE Vulnerabilities & Metrics

Focus on dasannetworks vulnerabilities and metrics.

Last updated: 16 Jan 2026, 23:25 UTC

About dasannetworks Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with dasannetworks. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total dasannetworks CVEs: 9
Earliest CVE date: 21 Jan 2018, 22:29 UTC
Latest CVE date: 19 Nov 2025, 18:15 UTC

Latest CVE reference: CVE-2025-63206

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical dasannetworks CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.32

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 3
7.0-8.9 3
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS dasannetworks CVEs

These are the five CVEs with the highest CVSS scores for dasannetworks, sorted by severity first and recency.

All CVEs for dasannetworks

CVE-2025-63206 dasannetworks vulnerability CVSS: 0 19 Nov 2025, 18:15 UTC

An authentication bypass issue was discovered in Dasan Switch DS2924 web based interface, firmware versions 1.01.18 and 1.02.00, allowing attackers to gain escalated privileges via storing crafted cookies in the web browser.

CVE-2019-9976 dasannetworks vulnerability CVSS: 4.0 11 Apr 2019, 19:29 UTC

The Boa server configuration on DASAN H660RM devices with firmware 1.03-0022 logs POST data to the /tmp/boa-temp file, which allows logged-in users to read the credentials of administration web interface users.

CVE-2019-9975 dasannetworks vulnerability CVSS: 5.0 11 Apr 2019, 19:29 UTC

DASAN H660RM devices with firmware 1.03-0022 use a hard-coded key for logs encryption. Data stored using this key can be decrypted by anyone able to access this key.

CVE-2019-9974 dasannetworks vulnerability CVSS: 6.4 11 Apr 2019, 19:29 UTC

diag_tool.cgi on DASAN H660RM GPON routers with firmware 1.03-0022 lacks any authorization check, which allows remote attackers to run a ping command via a GET request to enumerate LAN devices or crash the router with a DoS attack.

CVE-2019-8950 dasannetworks vulnerability CVSS: 10.0 20 Feb 2019, 04:29 UTC

The backdoor account dnsekakf2$$ in /bin/login on DASAN H665 devices with firmware 1.46p1-0028 allows an attacker to login to the admin account via TELNET.

CVE-2018-17867 dasannetworks vulnerability CVSS: 9.0 01 Oct 2018, 23:29 UTC

The Port Forwarding functionality on DASAN H660GW devices allows remote attackers to execute arbitrary code via shell metacharacters in the cgi-bin/adv_nat_virsvr.asp Addr parameter (aka the Local IP Address field).

CVE-2018-10562 dasannetworks vulnerability CVSS: 7.5 04 May 2018, 03:29 UTC

An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.

CVE-2018-10561 dasannetworks vulnerability CVSS: 7.5 04 May 2018, 03:29 UTC

An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.

CVE-2017-18046 dasannetworks vulnerability CVSS: 7.5 21 Jan 2018, 22:29 UTC

Buffer overflow on Dasan GPON ONT WiFi Router H640X 12.02-01121 2.77p1-1124 and 3.03p2-1146 devices allows remote attackers to execute arbitrary code via a long POST request to the login_action function in /cgi-bin/login_action.cgi (aka cgipage.cgi).