First published: Thu May 07 2020(Updated: )
An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn530hg4 Firmware | =m30hg4.v5030.191116 | |
Wavlink WN530HG4 | ||
Wavlink Wn531g3 Firmware | ||
Wavlink WN531G3 | ||
Wavlink Wn572hg3 Firmware | ||
Wavlink WN572HG3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10972 is high with a CVSS score of 7.5.
The affected devices are Wavlink WN530HG4, Wavlink Wn531g3 Firmware, and Wavlink Wn572hg3 Firmware.
An attacker can exploit CVE-2020-10972 by accessing a page with the current administrator password in cleartext, without requiring authentication.
Yes, Wavlink WN530HG4 is vulnerable to CVE-2020-10972.
To mitigate CVE-2020-10972, it is recommended to apply the latest firmware updates provided by Wavlink.