CVE-2020-23583

OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*
cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:13

Type Values Removed Values Added
References () https://github.com/huzaifahussain98/CVE-2020-23583 - Third Party Advisory () https://github.com/huzaifahussain98/CVE-2020-23583 - Third Party Advisory

Information

Published : 2022-11-23 01:15

Updated : 2024-11-21 05:13


NVD link : CVE-2020-23583

Mitre link : CVE-2020-23583

CVE.ORG link : CVE-2020-23583


JSON object : View

Products Affected

optilinknetwork

  • op-xt71000n
  • op-xt71000n_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')