CVE-2020-23587: n/a in n/a
A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New Routes in RoutingConfiguration on " /routing.asp ".
AI Analysis
Technical Summary
CVE-2020-23587 is a security vulnerability identified in the OPTILINK OP-XT71000N device, specifically affecting Hardware Version V2.2 and Firmware Version OP_V3.3.1-191028. The vulnerability allows an unauthenticated remote attacker to perform a Cross-Site Request Forgery (CSRF) attack targeting the device's routing configuration interface accessible via the "/routing.asp" endpoint. By exploiting this vulnerability, an attacker can add new routes to the device's routing table without requiring authentication. This manipulation can facilitate man-in-the-middle (MitM) attacks by redirecting network traffic through attacker-controlled paths. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery), indicating that the device lacks proper anti-CSRF protections on critical configuration pages. The CVSS v3.1 base score is 3.1, reflecting a low severity primarily due to the requirement of user interaction (UI:R) and high attack complexity (AC:H). The attack vector is network-based (AV:N), and no privileges are required (PR:N), but the attacker must trick a legitimate user into initiating the malicious request. The vulnerability impacts the integrity of the device’s routing configuration but does not directly affect confidentiality or availability. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. Given the device type (a network hardware router), successful exploitation could enable traffic interception, potentially compromising sensitive communications within affected networks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant in environments where OPTILINK OP-XT71000N devices are deployed, particularly in small to medium enterprises or branch offices relying on this hardware for routing. The ability to inject unauthorized routes can lead to man-in-the-middle attacks, enabling attackers to intercept, modify, or redirect network traffic. This undermines the integrity of communications and could facilitate further attacks such as credential theft, data exfiltration, or lateral movement within the network. Although the CVSS score is low, the real-world impact depends on the deployment context and user behavior since exploitation requires user interaction. Critical infrastructure or organizations handling sensitive data could face increased risk if attackers leverage this vulnerability to compromise network traffic. However, the absence of known exploits and the requirement for user interaction reduce the immediacy of the threat. Nonetheless, organizations should assess their network topology and device inventory to identify any affected hardware and evaluate exposure, especially where remote management interfaces are accessible.
Mitigation Recommendations
1. Network Segmentation: Isolate OPTILINK OP-XT71000N devices from direct internet exposure and restrict access to management interfaces to trusted internal networks only. 2. User Awareness: Educate users about the risks of unsolicited links or requests that could trigger CSRF attacks, emphasizing caution when interacting with device management portals. 3. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit access to the "/routing.asp" interface to authorized personnel only. 4. Monitoring and Logging: Enable detailed logging on the device and network perimeter to detect unusual routing changes or configuration modifications. 5. Firmware Updates: Regularly check for firmware updates or vendor advisories addressing this vulnerability and apply patches promptly once available. 6. Use of Web Application Firewalls (WAF): Deploy WAFs capable of detecting and blocking CSRF attack patterns targeting device management interfaces. 7. Disable Unnecessary Services: If possible, disable remote management features or restrict them to secure channels such as VPNs to reduce attack surface. 8. Incident Response Preparedness: Develop procedures to quickly respond to suspected routing configuration tampering, including route validation and device resets.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2020-23587: n/a in n/a
Description
A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New Routes in RoutingConfiguration on " /routing.asp ".
AI-Powered Analysis
Technical Analysis
CVE-2020-23587 is a security vulnerability identified in the OPTILINK OP-XT71000N device, specifically affecting Hardware Version V2.2 and Firmware Version OP_V3.3.1-191028. The vulnerability allows an unauthenticated remote attacker to perform a Cross-Site Request Forgery (CSRF) attack targeting the device's routing configuration interface accessible via the "/routing.asp" endpoint. By exploiting this vulnerability, an attacker can add new routes to the device's routing table without requiring authentication. This manipulation can facilitate man-in-the-middle (MitM) attacks by redirecting network traffic through attacker-controlled paths. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery), indicating that the device lacks proper anti-CSRF protections on critical configuration pages. The CVSS v3.1 base score is 3.1, reflecting a low severity primarily due to the requirement of user interaction (UI:R) and high attack complexity (AC:H). The attack vector is network-based (AV:N), and no privileges are required (PR:N), but the attacker must trick a legitimate user into initiating the malicious request. The vulnerability impacts the integrity of the device’s routing configuration but does not directly affect confidentiality or availability. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. Given the device type (a network hardware router), successful exploitation could enable traffic interception, potentially compromising sensitive communications within affected networks.
Potential Impact
For European organizations, the impact of this vulnerability could be significant in environments where OPTILINK OP-XT71000N devices are deployed, particularly in small to medium enterprises or branch offices relying on this hardware for routing. The ability to inject unauthorized routes can lead to man-in-the-middle attacks, enabling attackers to intercept, modify, or redirect network traffic. This undermines the integrity of communications and could facilitate further attacks such as credential theft, data exfiltration, or lateral movement within the network. Although the CVSS score is low, the real-world impact depends on the deployment context and user behavior since exploitation requires user interaction. Critical infrastructure or organizations handling sensitive data could face increased risk if attackers leverage this vulnerability to compromise network traffic. However, the absence of known exploits and the requirement for user interaction reduce the immediacy of the threat. Nonetheless, organizations should assess their network topology and device inventory to identify any affected hardware and evaluate exposure, especially where remote management interfaces are accessible.
Mitigation Recommendations
1. Network Segmentation: Isolate OPTILINK OP-XT71000N devices from direct internet exposure and restrict access to management interfaces to trusted internal networks only. 2. User Awareness: Educate users about the risks of unsolicited links or requests that could trigger CSRF attacks, emphasizing caution when interacting with device management portals. 3. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit access to the "/routing.asp" interface to authorized personnel only. 4. Monitoring and Logging: Enable detailed logging on the device and network perimeter to detect unusual routing changes or configuration modifications. 5. Firmware Updates: Regularly check for firmware updates or vendor advisories addressing this vulnerability and apply patches promptly once available. 6. Use of Web Application Firewalls (WAF): Deploy WAFs capable of detecting and blocking CSRF attack patterns targeting device management interfaces. 7. Disable Unnecessary Services: If possible, disable remote management features or restrict them to secure channels such as VPNs to reduce attack surface. 8. Incident Response Preparedness: Develop procedures to quickly respond to suspected routing configuration tampering, including route validation and device resets.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2020-08-13T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbefbb2
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 5:05:44 PM
Last updated: 8/1/2025, 7:17:16 AM
Views: 15
Related Threats
CVE-2025-53606: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Seata (incubating)
CriticalCVE-2025-48913: CWE-20 Improper Input Validation in Apache Software Foundation Apache CXF
HighCVE-2025-6572: CWE-79 Cross-Site Scripting (XSS) in OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer)
HighCVE-2025-54959: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54958: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Mubit co.,ltd. Powered BLUE 870
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.