9.8
CVSSv3

CVE-2020-23584

Published: 23/11/2022 Updated: 23/11/2022
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9

Vulnerability Summary

Unauthenticated remote code execution in OPTILINK OP-XT71000N, Hardware Version: V2.2 occurs when the attacker passes arbitrary commands with IP-ADDRESS using " | " to execute commands on " /diag_tracert_admin.asp " in the "PingTest" parameter that leads to command execution.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

optilinknetwork op-xt71000n_firmware 3.3.1-191028

Github Repositories

CVE-2020-23584 Unauthenticated remote code execution in OPTILINK OP-XT71000N, Hardware Version: V22 occurs when the attacker passes arbitrary commands with IP-ADDRESS using " | " to execute commands on " /diag_tracert_adminasp " in the "PingTest" parameter that leads to command execution authentication complexity vector not available not

CVE-2020-23584 OPTILINK E-PON "MODEL NO: OP-XT71000N" with "HARDWARE VERSION: V22"; & "FIRMWARE VERSION: OP_V331-191028" Unauthenticated remote code execution on "OPTILINK OP-XT71000N, Hardware Version: V22" The issue occurs when the attacker passes arbitrary commands with IP-ADDRESS using " | " to execute commands