WAVLINK - Access Control
ID: CVE-2020-10973
Severity: high
Author: arafatansari
Tags: cve,cve2020,exposure,wavlink
Description
Section titled “Description”Wavlink WN530HG4, WN531G3, WN533A8, and WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.
YAML Source
Section titled “YAML Source”id: CVE-2020-10973
info: name: WAVLINK - Access Control author: arafatansari severity: high description: | Wavlink WN530HG4, WN531G3, WN533A8, and WN551K are susceptible to improper access control via /cgi-bin/ExportAllSettings.sh, where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information or control of the affected device. remediation: | Apply the latest firmware update provided by the vendor to fix the access control issue. reference: - https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973 - https://github.com/sudo-jtcsec/Nyra - https://nvd.nist.gov/vuln/detail/CVE-2020-10973 - https://github.com/Roni-Carta/nyra - https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973-affected_devices classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-10973 cwe-id: CWE-306 epss-score: 0.02524 epss-percentile: 0.90149 cpe: cpe:2.3:o:wavlink:wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: wavlink product: wn530hg4_firmware shodan-query: - http.html:"Wavlink" - http.html:"wavlink" fofa-query: body="wavlink" tags: cve,cve2020,exposure,wavlink
http: - raw: - | GET /backupsettings.dat HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - 'Salted__'
- type: word part: header words: - application/octet-stream
- type: status status: - 200# digest: 490a0046304402207de71273647d8a2ba7fcce8a70d496ec55f06af77e8075b9ea3115d2319250ef02202bf599c67fcc4e9b194d545d5d371a2f02af76ffba822688ebb3f160a8e891df:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-10973.yaml"