An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.

Project Subscriptions

Vendors Products
Wavlink Subscribe
Wn530hg4 Subscribe
Wn530hg4 Firmware Subscribe
Wn531g3 Subscribe
Wn531g3 Firmware Subscribe
Wn533a8 Subscribe
Wn533a8 Firmware Subscribe
Wn551k1 Subscribe
Wn551k1 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:21:14.457Z

Reserved: 2020-03-26T00:00:00

Link: CVE-2020-10973

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-07T18:15:11.287

Modified: 2024-11-21T04:56:29.407

Link: CVE-2020-10973

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses