An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973 | third party advisory |
https://github.com/sudo-jtcsec/Nyra | broken link |
https://github.com/Roni-Carta/nyra | third party advisory not applicable |
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973-affected_devices | third party advisory |