CVE-2020-10972
Summary
| CVE | CVE-2020-10972 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-07 18:15:00 UTC |
| Updated | 2022-04-29 13:26:00 UTC |
| Description | An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3 |
Risk And Classification
Problem Types: CWE-306 | CWE-522
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Wavlink | Wn530hg4 | - | All | All | All |
| Hardware | Wavlink | Wn530hg4 | - | All | All | All |
| Operating System | Wavlink | Wn530hg4 Firmware | m30hg4.v5030.191116 | All | All | All |
| Operating System | Wavlink | Wn530hg4 Firmware | m30hg4.v5030.191116 | All | All | All |
| Hardware | Wavlink | Wn531g3 | - | All | All | All |
| Operating System | Wavlink | Wn531g3 Firmware | - | All | All | All |
| Hardware | Wavlink | Wn572hg3 | - | All | All | All |
| Operating System | Wavlink | Wn572hg3 Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE/CVE-2020-10972 at master · sudo-jtcsec/CVE · GitHub | MISC | github.com | Third Party Advisory |
| GitHub - Roni-Carta/nyra | MISC | github.com | |
| GitHub - sudo-jtcsec/Nyra: If you have a Wavlink router, its Not Your Router Anymore | MISC | github.com | |
| CVE/CVE-2020-10972-affected_devices at master · sudo-jtcsec/CVE · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.