CVE-2020-23583
Published on: Not Yet Published
Last Modified on: 11/23/2022 08:03:00 PM UTC
Certain versions of Op-xt71000n from Optilinknetwork contain the following vulnerability:
OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.
- CVE-2020-23583 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
GitHub - huzaifahussain98/CVE-2020-23583: REMOTE CODE EXECUTION found in "OPTILINK OP-XT71000N". | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Optilinknetwork | Op-xt71000n | 2.2 | All | All | All |
Operating System | Optilinknetwork | Op-xt71000n Firmware | 3.3.1-191028 | All | All | All |
- cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*:
- cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2020-23583 : OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attack… twitter.com/i/web/status/1… | 2022-11-23 01:05:53 |
![]() |
Potentially Critical CVE Detected! CVE-2020-23583 OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution.… twitter.com/i/web/status/1… | 2022-11-23 01:56:00 |
![]() |
CVE-2020-23583 | 2022-11-23 02:38:49 |