Home

Description

V-SOL GPON/EPON OLT Platform v2.03 contains an open redirect vulnerability in the script that allows attackers to manipulate the 'parent' GET parameter. Attackers can craft malicious links that redirect logged-in users to arbitrary websites by exploiting improper input validation in the redirect mechanism.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-07 | Updated 2026-01-08 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

URL Redirection to Untrusted Site ('Open Redirect')

Product status

V2.03.62R_IPv6
affected

V2.03.54R
affected

V2.03.52R
affected

V2.03.49
affected

V2.03.47
affected

V2.03.40
affected

V2.03.26
affected

V2.03.24
affected

V1.8.6
affected

V1.4
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5535.php (Zero Science Lab Vulnerability Advisory) third-party-advisory

packetstormsecurity.com/files/154628 (Packet Storm Security Exploit Entry) exploit

exchange.xforce.ibmcloud.com/vulnerabilities/167772 (IBM X-Force Vulnerability Exchange) vdb-entry

cxsecurity.com/issue/WLB-2019090193 (CXSecurity Vulnerability Database Entry) third-party-advisory

www.vsolcn.com/ (VSOL Vendor Homepage) product

cve.org (CVE-2019-25282)

nvd.nist.gov (CVE-2019-25282)

Download JSON