Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*", "matchCriteriaId": "4EDEBD78-C546-49B2-947C-2821E8C89A26", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ACAF792-450A-4C0D-81DF-CC61EBCA7305", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAE015CD-5B74-46BF-96E1-2ABB1EA36BDC", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE2AAA4-71D2-4B70-81FB-836F1A419DBC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wavlink:wn572hg3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "442C07D4-A5F1-4BD5-9727-523D57DB18F8", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D85484EB-22F0-4140-9B9F-AC5EB24159DA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3"}, {"lang": "es", "value": "Se detect\u00f3 un problema en donde una p\u00e1gina es expuesta que posee la contrase\u00f1a de administrador actual en texto sin cifrar en el c\u00f3digo fuente de la p\u00e1gina. No es requerida una autenticaci\u00f3n para alcanzar la p\u00e1gina (una determinada p\u00e1gina live_?.shtml con la variable syspasswd). Dispositivos afectados: Wavlink WN530HG4, Wavlink WN531G3, y Wavlink WN572HG3"}], "id": "CVE-2020-10972", "lastModified": "2024-11-21T04:56:29.260", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-05-07T18:15:11.257", "references": [{"source": "cve@mitre.org", "tags": ["Not Applicable", "Third Party Advisory"], "url": "https://github.com/Roni-Carta/nyra"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices"}, {"source": "cve@mitre.org", "tags": ["Broken Link"], "url": "https://github.com/sudo-jtcsec/Nyra"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable", "Third Party Advisory"], "url": "https://github.com/Roni-Carta/nyra"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"], "url": "https://github.com/sudo-jtcsec/Nyra"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}, {"lang": "en", "value": "CWE-522"}], "source": "nvd@nist.gov", "type": "Primary"}]}