Description
An issue was discovered affecting a backup feature where a crafted POST request returns the current configuration of the device in cleartext, including the administrator password. No authentication is required. Affected devices: Wavlink WN575A3, Wavlink WN579G3, Wavlink WN531A6, Wavlink WN535G3, Wavlink WN530H4, Wavlink WN57X93, Wavlink WN572HG3, Wavlink WN575A4, Wavlink WN578A2, Wavlink WN579G3, Wavlink WN579X3, and Jetstream AC3000/ERAC3000
References (4)
Core 4
Core References
Third Party Advisory x_refsource_misc
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10974
Broken Link x_refsource_misc
https://github.com/sudo-jtcsec/Nyra
Not Applicable, Third Party Advisory x_refsource_misc
https://github.com/Roni-Carta/nyra
Third Party Advisory x_refsource_misc
https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10974-affected_devices
Scores
CVSS v3
7.5
EPSS
0.0034
EPSS Percentile
56.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-306
Status
published
Products (13)
wavlink/jetstream_ac3000_firmware
wavlink/jetstream_erac3000_firmware
wavlink/wl-wn575a3_firmware
rpt75a3.v4300.180801
wavlink/wl-wn579g3_firmware
m79x3.v5030.180719
wavlink/wn530h4_firmware
wavlink/wn531a6_firmware
wavlink/wn535g3_firmware
wavlink/wn572hg3_firmware
wavlink/wn575a4_firmware
wavlink/wn578a2_firmware
... and 3 more
Published
May 07, 2020
Tracked Since
Feb 18, 2026