CVE-2020-10972

An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wavlink:wn572hg3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*

History

29 Apr 2022, 13:26

Type Values Removed Values Added
References (MISC) https://github.com/Roni-Carta/nyra - (MISC) https://github.com/Roni-Carta/nyra - Not Applicable, Third Party Advisory
References (MISC) https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices - (MISC) https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices - Third Party Advisory
References (MISC) https://github.com/sudo-jtcsec/Nyra - (MISC) https://github.com/sudo-jtcsec/Nyra - Broken Link
CPE cpe:2.3:o:wavlink:wn572hg3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*
First Time Wavlink wn572hg3
Wavlink wn531g3
Wavlink wn572hg3 Firmware
Wavlink wn531g3 Firmware
CWE CWE-306

Information

Published : 2020-05-07 18:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-10972

Mitre link : CVE-2020-10972

CVE.ORG link : CVE-2020-10972


JSON object : View

Products Affected

wavlink

  • wn572hg3
  • wn531g3
  • wn530hg4_firmware
  • wn530hg4
  • wn531g3_firmware
  • wn572hg3_firmware
CWE
CWE-306

Missing Authentication for Critical Function

CWE-522

Insufficiently Protected Credentials