CVE-2022-4985
Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Vendor
-
Product
-
CWE
Yayın Tarihi
2025-11-14 23:15:43
Güncelleme
2025-11-18 17:15:57
Source Identifier
disclosure@vulncheck.com
KEV Date Added
-
Kategoriler
Referanslar
https://cxsecurity.com/issue/WLB-2022010024
https://help.vodacom.co.za/personal/home/61/9493/1023659/Vodafone-H500s-WiFi-router
https://www.exploit-db.com/exploits/50636
https://www.vulncheck.com/advisories/vodafone-h500s-wifi-password-disclosure-via-activation-json
https://cxsecurity.com/issue/WLB-2022010024
https://www.exploit-db.com/exploits/50636