Description
OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.
Affected Software
{"id": "CVE-2020-23583", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2020-23583", "description": "OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on \"/diag_ping_admin.asp\" to \"PingTest\" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the COMMAND and can compromise full system.", "published": "2022-11-23T01:15:00", "modified": "2022-11-23T20:03:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23583", "reporter": "cve@mitre.org", "references": ["https://github.com/huzaifahussain98/CVE-2020-23583"], "cvelist": ["CVE-2020-23583"], "immutableFields": [], "lastseen": "2022-11-23T21:38:24", "viewCount": 10, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}, "twitter": {"counter": 7, "tweets": [{"link": "https://twitter.com/4ng3n01r3/status/1595325050538057729", "text": "/hashtag/CyberSecurity?src=hashtag_click /hashtag/Security?src=hashtag_click /hashtag/CERT?src=hashtag_click /hashtag/CVE?src=hashtag_click /hashtag/Nist?src=hashtag_click /hashtag/breach?src=hashtag_click /hashtag/vulnerability?src=hashtag_click : CVE-2020-23583 https://t.co/qMRlX9MO9o", "author": "4ng3n01r3", "author_photo": "https://pbs.twimg.com/profile_images/1566682883670118404/pHq2hcfz_400x400.jpg"}, {"link": "https://twitter.com/xanadulinux/status/1595309358719668225", "text": "CVE-2020-23583 https://t.co/hEnlZL8fir", "author": "xanadulinux", "author_photo": "https://pbs.twimg.com/profile_images/466955855892455424/BAnnwGhT_400x400.png"}, {"link": "https://twitter.com/vulnonym/status/1595315158766739456", "text": "Hi, I'm CVE-2020-23583. I was never good with numbers though, so you can call me Jumpy Creodont\nhttps://t.co/nDPox1Xzem", "author": "vulnonym", "author_photo": "https://pbs.twimg.com/profile_images/1235605772878438405/6p9IJVtn_400x400.jpg"}, {"link": "https://twitter.com/4ng3n01r3/status/1595536435322429457", "text": "/hashtag/CyberSecurity?src=hashtag_click /hashtag/Security?src=hashtag_click /hashtag/CERT?src=hashtag_click /hashtag/CVE?src=hashtag_click /hashtag/Nist?src=hashtag_click /hashtag/breach?src=hashtag_click /hashtag/vulnerability?src=hashtag_click : CVE-2020-23583 (op-xt71000n_firmware) https://t.co/qMRlX9MgjQ", "author": "4ng3n01r3", "author_photo": "https://pbs.twimg.com/profile_images/1566682883670118404/pHq2hcfz_400x400.jpg"}]}, "affected_software": {"major_version": [{"name": "optilinknetwork op-xt71000n firmware", "version": 3}]}, "vulnersScore": 7.2}, "_state": {"dependencies": 1669239584, "score": 1669239754, "twitter": 1669243223, "affected_software_major_version": 1671611801}, "_internal": {"score_hash": "d7f348a3f6cd251cf4bd7867d0e17e54"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028"], "cpe23": ["cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*"], "cwe": ["CWE-77"], "affectedSoftware": [{"cpeName": "optilinknetwork:op-xt71000n_firmware", "version": "3.3.1-191028", "operator": "eq", "name": "optilinknetwork op-xt71000n firmware"}], "affectedConfiguration": [{"name": "optilinknetwork op-xt71000n", "cpeName": "optilinknetwork:op-xt71000n", "version": "2.2", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:optilinknetwork:op-xt71000n_firmware:3.3.1-191028:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:h:optilinknetwork:op-xt71000n:2.2:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://github.com/huzaifahussain98/CVE-2020-23583", "name": "https://github.com/huzaifahussain98/CVE-2020-23583", "refsource": "MISC", "tags": ["Third Party Advisory"]}]}
{}