7.5
CVSSv3

CVE-2020-10972

Published: 07/05/2020 Updated: 29/04/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wavlink wn530hg4_firmware m30hg4.v5030.191116

wavlink wn531g3_firmware -

wavlink wn572hg3_firmware -

Github Repositories

accidentally openwrt

DIRTY FLASH OPENWRT on the following and shut the stock firmware backdoor for goodgitopenwrtorg/?p=openwrt/openwrtgit;a=commit;h=51b653de94e7e5006b5480df33d5dfd9de824cc7 Note As of now 5ghz module on radio2 seems to not cleanly flash with the below method It would require building openwrt from 'make menu' command with that module selected in the build op