Lucene search

K
cveMitreCVE-2020-23585
HistoryNov 23, 2022 - 1:15 a.m.

CVE-2020-23585

2022-11-2301:15:09
CWE-352
mitre
web.nvd.nist.gov
20
7
cve-2020-23585
csrf
optilink
op-xt71000n
firmware
vulnerability
router
network

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

36.5%

A remote attacker can conduct a cross-site request forgery (CSRF) attack on OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028. The vulnerability is due to insufficient CSRF protections for the “mgm_config_file.asp” because of which attacker can create a crafted “csrf form” which sends " malicious xml data" to “/boaform/admin/formMgmConfigUpload”. the exploit allows attacker to “gain full privileges” and to “fully compromise of router & network”.

Affected configurations

Nvd
Node
optilinknetworkop-xt71000n_firmwareMatch3.3.1-191028
AND
optilinknetworkop-xt71000nMatch2.2
VendorProductVersionCPE
optilinknetworkop-xt71000n_firmware3.3.1-191028cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*
optilinknetworkop-xt71000n2.2cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*

Social References

More

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

36.5%

Related for CVE-2020-23585