Enhancement: cves/2020/CVE-2020-10973.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-02-01 13:23:46 -05:00
parent b4d0c10850
commit 3bb08ce785
1 changed files with 1 additions and 1 deletions

View File

@ -5,7 +5,7 @@ info:
author: arafatansari
severity: high
description: |
Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
Wavlink WN530HG4, WN531G3, WN533A8, and WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
reference:
- https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973
- https://github.com/sudo-jtcsec/Nyra