V-SOL GPON/EPON OLT Platform 2.03 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to create admin users, enable SSH, or modify system settings by tricking authenticated administrators into loading a specially crafted page.
PUBLISHED5.2CWE-352
V-SOL GPON/EPON OLT Platform 2.03 Cross-Site Request Forgery Vulnerability
Problem type
Affected products
Guangzhou V-SOLUTION Electronic Technology Co., Ltd.
SOL GPON/EPON OLT Platform
2.03 - AFFECTED
References
ExploitDB-47434
https://www.exploit-db.com/exploits/47434
V-SOL Product Homepage
https://www.vsolcn.com
Zero Science Lab Disclosure (ZSL-2019-5536)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5536.php
GitHub Security Advisories
GHSA-cfpm-r69w-j97p
V-SOL GPON/EPON OLT Platform 2.03 contains a cross-site request forgery vulnerability that allows...
https://github.com/advisories/GHSA-cfpm-r69w-j97pV-SOL GPON/EPON OLT Platform 2.03 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to create admin users, enable SSH, or modify system settings by tricking authenticated administrators into loading a specially crafted page.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25238Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25238",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2025-12-24T20:23:38.963Z",
"dateReserved": "2025-12-24T14:27:12.476Z",
"datePublished": "2025-12-24T19:27:56.801Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2025-12-24T19:27:56.801Z"
},
"datePublic": "2019-09-26T00:00:00.000Z",
"title": "V-SOL GPON/EPON OLT Platform 2.03 Cross-Site Request Forgery Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "V-SOL GPON/EPON OLT Platform 2.03 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to create admin users, enable SSH, or modify system settings by tricking authenticated administrators into loading a specially crafted page."
}
],
"affected": [
{
"vendor": "Guangzhou V-SOLUTION Electronic Technology Co., Ltd.",
"product": "SOL GPON/EPON OLT Platform",
"versions": [
{
"version": "2.03",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/47434",
"name": "ExploitDB-47434",
"tags": [
"exploit"
]
},
{
"url": "https://www.vsolcn.com",
"name": "V-SOL Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5536.php",
"name": "Zero Science Lab Disclosure (ZSL-2019-5536)",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
}
}
],
"credits": [
{
"lang": "en",
"value": "LiquidWorm as Gjoko Krstic of Zero Science Lab",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-24T20:23:38.963Z"
},
"title": "CISA ADP Vulnrichment",
"references": [
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5536.php",
"tags": [
"exploit"
]
}
],
"metrics": [
{}
]
}
]
}
}