CVE-2020-10972 (GCVE-0-2020-10972)
Vulnerability from cvelistv5 – Published: 2020-05-07 17:51 – Updated: 2024-08-04 11:21
VLAI?
Summary
An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:21:14.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sudo-jtcsec/Nyra"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Roni-Carta/nyra"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-12-04T19:32:54",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sudo-jtcsec/Nyra"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Roni-Carta/nyra"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-10972",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972",
"refsource": "MISC",
"url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972"
},
{
"name": "https://github.com/sudo-jtcsec/Nyra",
"refsource": "MISC",
"url": "https://github.com/sudo-jtcsec/Nyra"
},
{
"name": "https://github.com/Roni-Carta/nyra",
"refsource": "MISC",
"url": "https://github.com/Roni-Carta/nyra"
},
{
"name": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices",
"refsource": "MISC",
"url": "https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-10972",
"datePublished": "2020-05-07T17:51:48",
"dateReserved": "2020-03-26T00:00:00",
"dateUpdated": "2024-08-04T11:21:14.518Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EDEBD78-C546-49B2-947C-2821E8C89A26\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ACAF792-450A-4C0D-81DF-CC61EBCA7305\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAE015CD-5B74-46BF-96E1-2ABB1EA36BDC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AE2AAA4-71D2-4B70-81FB-836F1A419DBC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wavlink:wn572hg3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"442C07D4-A5F1-4BD5-9727-523D57DB18F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D85484EB-22F0-4140-9B9F-AC5EB24159DA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 un problema en donde una p\\u00e1gina es expuesta que posee la contrase\\u00f1a de administrador actual en texto sin cifrar en el c\\u00f3digo fuente de la p\\u00e1gina. No es requerida una autenticaci\\u00f3n para alcanzar la p\\u00e1gina (una determinada p\\u00e1gina live_?.shtml con la variable syspasswd). Dispositivos afectados: Wavlink WN530HG4, Wavlink WN531G3, y Wavlink WN572HG3\"}]",
"id": "CVE-2020-10972",
"lastModified": "2024-11-21T04:56:29.260",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-05-07T18:15:11.257",
"references": "[{\"url\": \"https://github.com/Roni-Carta/nyra\", \"source\": \"cve@mitre.org\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/sudo-jtcsec/Nyra\", \"source\": \"cve@mitre.org\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://github.com/Roni-Carta/nyra\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/sudo-jtcsec/Nyra\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-306\"}, {\"lang\": \"en\", \"value\": \"CWE-522\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-10972\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-05-07T18:15:11.257\",\"lastModified\":\"2024-11-21T04:56:29.260\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en donde una p\u00e1gina es expuesta que posee la contrase\u00f1a de administrador actual en texto sin cifrar en el c\u00f3digo fuente de la p\u00e1gina. No es requerida una autenticaci\u00f3n para alcanzar la p\u00e1gina (una determinada p\u00e1gina live_?.shtml con la variable syspasswd). Dispositivos afectados: Wavlink WN530HG4, Wavlink WN531G3, y Wavlink WN572HG3\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"},{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDEBD78-C546-49B2-947C-2821E8C89A26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ACAF792-450A-4C0D-81DF-CC61EBCA7305\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wavlink:wn531g3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAE015CD-5B74-46BF-96E1-2ABB1EA36BDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE2AAA4-71D2-4B70-81FB-836F1A419DBC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wavlink:wn572hg3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442C07D4-A5F1-4BD5-9727-523D57DB18F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D85484EB-22F0-4140-9B9F-AC5EB24159DA\"}]}]}],\"references\":[{\"url\":\"https://github.com/Roni-Carta/nyra\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/sudo-jtcsec/Nyra\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://github.com/Roni-Carta/nyra\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/sudo-jtcsec/Nyra\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…