Description
Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Problem types
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
Product status
Any version
Timeline
| 2022-01-05: | ExploitDB-50636 is publicly disclosed. |
Credits
Daniel Monzón (stark0de)
References
cxsecurity.com/issue/WLB-2022010024
www.exploit-db.com/exploits/50636
www.exploit-db.com/exploits/50636
cxsecurity.com/issue/WLB-2022010024
help.vodacom.co.za/...493/1023659/Vodafone-H500s-WiFi-router
www.vulncheck.com/...password-disclosure-via-activation-json