First published: Wed Nov 23 2022(Updated: )
A remote attacker can conduct a cross-site request forgery (CSRF) attack on OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028. The vulnerability is due to insufficient CSRF protections for the "mgm_config_file.asp" because of which attacker can create a crafted "csrf form" which sends " malicious xml data" to "/boaform/admin/formMgmConfigUpload". the exploit allows attacker to "gain full privileges" and to "fully compromise of router & network".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Optilinknetwork Op-xt71000n Firmware | =3.3.1-191028 | |
Optilinknetwork Op-xt71000n | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-23585 is considered a high severity vulnerability due to the potential for remote exploitation via CSRF.
To fix CVE-2020-23585, update the OPTILINK OP-XT71000N firmware to the latest version that addresses CSRF protection.
CVE-2020-23585 facilitates a cross-site request forgery (CSRF) attack.
CVE-2020-23585 affects OPTILINK OP-XT71000N with Firmware Version OP_V3.3.1-191028.
Yes, CVE-2020-23585 can be exploited remotely by an attacker to perform unauthorized actions.