CVE-2020-10972
moderate-risk
Published 2020-05-07
An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3
Do I need to act?
-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (3)
Affected Vendors
References (8)
Not Applicable
https://github.com/Roni-Carta/nyra
Third Party Advisory
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972
Third Party Advisory
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices
Broken Link
https://github.com/sudo-jtcsec/Nyra
Not Applicable
https://github.com/Roni-Carta/nyra
Third Party Advisory
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972
Third Party Advisory
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10972-affected_devices
Broken Link
https://github.com/sudo-jtcsec/Nyra
36
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
9/34 · Low