Enhancement: cves/2020/CVE-2020-10973.yaml by md
parent
b4d0c10850
commit
3bb08ce785
|
@ -5,7 +5,7 @@ info:
|
||||||
author: arafatansari
|
author: arafatansari
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
|
Wavlink WN530HG4, WN531G3, WN533A8, and WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973
|
- https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973
|
||||||
- https://github.com/sudo-jtcsec/Nyra
|
- https://github.com/sudo-jtcsec/Nyra
|
||||||
|
|
Loading…
Reference in New Issue