First published: Thu May 07 2020(Updated: )
An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn530hg4 Firmware | =m30hg4.v5030.191116 | |
Wavlink WN530HG4 | ||
Wavlink Wn531g3 Firmware | ||
Wavlink WN531G3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn551k1 Firmware | ||
Wavlink WN551K1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10973 is a vulnerability affecting Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 devices, allowing an attacker to retrieve the device's configuration, including the administrator password, without authentication.
CVE-2020-10973 has a severity score of 7.5, which is classified as high.
Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 devices are affected by CVE-2020-10973.
No authentication is required to exploit CVE-2020-10973.
Currently, there is no known fix for CVE-2020-10973. It is recommended to contact the vendor or apply any patches or updates they provide.