Optilinknetwork

Op-xt71000n Firmware

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 18.99%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 25.04.2025 21:15:17

Unauthenticated remote code execution in OPTILINK OP-XT71000N, Hardware Version: V2.2 occurs when the attacker passes arbitrary commands with IP-ADDRESS using " | " to execute commands on " /diag_tracert_admin.asp " in the "PingTest" parameter that l...

  • EPSS 0.12%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 25.04.2025 21:15:17

A vulnerability found in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to Add Network Traffic Control Type Rule.

  • EPSS 0.09%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 25.04.2025 21:15:17

A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New R...

  • EPSS 0.16%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 25.04.2025 21:15:17

A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to "Enable or Disable Ports" and to "Change port numb...

  • EPSS 0.16%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 29.04.2025 16:15:22

A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to cause a Denial of Service by Rebooting the router ...

  • EPSS 0.17%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 29.04.2025 16:15:22

A vulnerability in Optilink OP-XT71000N Hardware version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated remote attacker to conduct a cross-site request forgery (CSRF) attack to change the Password for "WLAN SSID" through "wlwpa....

  • EPSS 0.82%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 29.04.2025 16:15:22

A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an attacker to upload arbitrary files through " /mgm_dev_upgrade.asp " which can "delete every file for Denial of Service (using 'rm -rf *.*' i...

  • EPSS 0.32%
  • Veröffentlicht 23.11.2022 02:15:09
  • Zuletzt bearbeitet 29.04.2025 16:15:22

A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to Reset ONU to Factory Default through ' /mgm_dev_re...

  • EPSS 7.77%
  • Veröffentlicht 23.11.2022 01:15:09
  • Zuletzt bearbeitet 25.04.2025 21:15:17

OPTILINK OP-XT71000N V2.2 is vulnerable to Remote Code Execution. The issue occurs when the attacker sends an arbitrary code on "/diag_ping_admin.asp" to "PingTest" interface that leads to COMMAND EXECUTION. An attacker can successfully trigger the C...

  • EPSS 0.21%
  • Veröffentlicht 23.11.2022 01:15:09
  • Zuletzt bearbeitet 25.04.2025 21:15:17

A remote attacker can conduct a cross-site request forgery (CSRF) attack on OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028. The vulnerability is due to insufficient CSRF protections for the "mgm_config_file.asp" beca...