9.8
CVSSv3

CVE-2020-23583

Published: 23/11/2022 Updated: 23/11/2022
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9

Vulnerability Summary

OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

optilinknetwork op-xt71000n_firmware 3.3.1-191028

Github Repositories

CVE-2020-23583 OPTILINK OP-XT71000N V22 is vulnerable to Remote Code Execution The issue occurs when the attacker sends an arbitrary code on "/diag_ping_adminasp" to "PingTest" interface that leads to COMMAND EXECUTION An attacker can successfully trigger the COMMAND and can compromise full system authentication complexity vector not available no

CVE-2020-23583 OPTILINK E-PON "MODEL NO: OP-XT71000N" with "HARDWARE VERSION: V22"; & "FIRMWARE VERSION: OP_V331-191028" REMOTE CODE EXECUTION found in "OPTILINK OP-XT71000N" The issue occurs when the attacker sends an arbitrary code on "/diag_ping_adminasp" to "PingTest" interface that leads to COMMAND EX