CVE-2020-10973
Summary
| CVE | CVE-2020-10973 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-07 18:15:00 UTC |
| Updated | 2022-04-28 19:30:00 UTC |
| Description | An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available. |
Risk And Classification
Problem Types: CWE-306
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Wavlink | Wn530hg4 | - | All | All | All |
| Hardware | Wavlink | Wn530hg4 | - | All | All | All |
| Operating System | Wavlink | Wn530hg4 Firmware | m30hg4.v5030.191116 | All | All | All |
| Operating System | Wavlink | Wn530hg4 Firmware | m30hg4.v5030.191116 | All | All | All |
| Hardware | Wavlink | Wn531g3 | - | All | All | All |
| Operating System | Wavlink | Wn531g3 Firmware | - | All | All | All |
| Hardware | Wavlink | Wn533a8 | - | All | All | All |
| Operating System | Wavlink | Wn533a8 Firmware | - | All | All | All |
| Hardware | Wavlink | Wn551k1 | - | All | All | All |
| Operating System | Wavlink | Wn551k1 Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| GitHub - Roni-Carta/nyra | MISC | github.com | |
| CVE/CVE-2020-10973 at master · sudo-jtcsec/CVE · GitHub | MISC | github.com | Third Party Advisory |
| CVE/CVE-2020-10973-affected_devices at master · sudo-jtcsec/CVE · GitHub | MISC | github.com | |
| GitHub - sudo-jtcsec/Nyra: If you have a Wavlink router, its Not Your Router Anymore | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.