An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973 | Third Party Advisory | 
| https://github.com/sudo-jtcsec/Nyra | Broken Link | 
| https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973-affected_devices | Third Party Advisory | 
| https://github.com/Roni-Carta/nyra | Not Applicable Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 2 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 3 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 4 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2020-05-07 11:15
Updated : 2022-04-28 12:30
NVD link : CVE-2020-10973
Mitre link : CVE-2020-10973
JSON object : View
CWE
                
                    
                        
                        CWE-306
                        
            Missing Authentication for Critical Function
Products Affected
                wavlink
- wn531g3_firmware
 - wn533a8
 - wn533a8_firmware
 - wn530hg4
 - wn551k1_firmware
 - wn531g3
 - wn530hg4_firmware
 - wn551k1
 


