CVE-2020-23586
Published on: Not Yet Published
Last Modified on: 11/23/2022 08:35:00 PM UTC
Certain versions of Op-xt71000n from Optilinknetwork contain the following vulnerability:
A vulnerability found in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to Add Network Traffic Control Type Rule.
- CVE-2020-23586 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
GitHub - huzaifahussain98/CVE-2020-23586: CSRF allows to Add Network Traffic Control Type Rule | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
CSRF allows to Add Network Traffic Control Type Rule
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Optilinknetwork | Op-xt71000n | 2.2 | All | All | All |
Operating System | Optilinknetwork | Op-xt71000n Firmware | 3.3.1-191028 | All | All | All |
- cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*:
- cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2020-23586 : A vulnerability found in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1… twitter.com/i/web/status/1… | 2022-11-23 02:02:10 |
![]() |
CVE-2020-23586 | 2022-11-23 03:38:43 |