Description
An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
Published: 2020-05-07
Score: 7.5 High
EPSS: 24.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Wavlink Wn530hg4 Wn530hg4 Firmware Wn531g3 Wn531g3 Firmware Wn533a8 Wn533a8 Firmware Wn551k1 Wn551k1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:21:14.457Z

Reserved: 2020-03-26T00:00:00.000Z

Link: CVE-2020-10973

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-07T18:15:11.287

Modified: 2024-11-21T04:56:29.407

Link: CVE-2020-10973

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses