BrightSign Digital Signage Diagnostic Web Server 8.2.26 and less contains an unauthenticated server-side request forgery vulnerability in the 'url' GET parameter of the Download Speed Test service. Attackers can specify external domains to bypass firewalls and perform network enumeration by forcing the application to make arbitrary HTTP requests to internal network hosts.
CVSS
No CVSS.
References
Configurations
No configuration.
History
11 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/48843 - | |
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5595.php - |
10 Dec 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 21:16
Updated : 2025-12-12 15:18
NVD link : CVE-2020-36884
Mitre link : CVE-2020-36884
CVE.ORG link : CVE-2020-36884
JSON object : View
Products Affected
No product.
CWE
CWE-918
Server-Side Request Forgery (SSRF)
