Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 18 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Vodafone vodafone H500s
CPEs cpe:2.3:a:vodafone:vodafone_h500s:*:*:*:*:*:*:*:*
Vendors & Products Vodafone vodafone H500s

Sat, 15 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Sercomm
Sercomm h500s
Vodafone
Vodafone h500s
Vendors & Products Sercomm
Sercomm h500s
Vodafone
Vodafone h500s

Fri, 14 Nov 2025 23:00:00 +0000

Type Values Removed Values Added
Description Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Title Vodafone H500s WiFi Password Disclosure via activation.json
Weaknesses CWE-497
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-18T16:17:58.154Z

Reserved: 2025-11-14T21:18:12.405Z

Link: CVE-2022-4985

cve-icon Vulnrichment

Updated: 2025-11-18T16:17:41.938Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-14T23:15:43.447

Modified: 2025-11-18T17:15:57.493

Link: CVE-2022-4985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-15T22:07:32Z

Weaknesses