CVE-2020-10972

An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wavlink:wn572hg3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:56

Type Values Removed Values Added
References () https://github.com/Roni-Carta/nyra - Not Applicable, Third Party Advisory () https://github.com/Roni-Carta/nyra - Not Applicable, Third Party Advisory
References () https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972 - Third Party Advisory () https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972 - Third Party Advisory
References () https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices - Third Party Advisory () https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices - Third Party Advisory
References () https://github.com/sudo-jtcsec/Nyra - Broken Link () https://github.com/sudo-jtcsec/Nyra - Broken Link

Information

Published : 2020-05-07 18:15

Updated : 2024-11-21 04:56


NVD link : CVE-2020-10972

Mitre link : CVE-2020-10972

CVE.ORG link : CVE-2020-10972


JSON object : View

Products Affected

wavlink

  • wn530hg4_firmware
  • wn531g3_firmware
  • wn530hg4
  • wn572hg3_firmware
  • wn572hg3
  • wn531g3
CWE
CWE-306

Missing Authentication for Critical Function

CWE-522

Insufficiently Protected Credentials