A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to "Enable or Disable Ports" and to "Change port number" through " /rmtacc.asp ".
References
Link | Resource |
---|---|
https://github.com/huzaifahussain98/CVE-2020-23588 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Nov 2022, 20:43
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/huzaifahussain98/CVE-2020-23588 - Third Party Advisory | |
CPE | cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:* cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:* |
|
First Time |
Optilinknetwork op-xt71000n Firmware
Optilinknetwork Optilinknetwork op-xt71000n |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CWE | CWE-352 |
23 Nov 2022, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-23 02:15
Updated : 2023-12-10 14:48
NVD link : CVE-2020-23588
Mitre link : CVE-2020-23588
CVE.ORG link : CVE-2020-23588
JSON object : View
Products Affected
optilinknetwork
- op-xt71000n_firmware
- op-xt71000n
CWE
CWE-352
Cross-Site Request Forgery (CSRF)