Advisories

Vodafone H500s WiFi Password Disclosure via activation.json

Go Back
severity
high
date
Affecting
  • H500s firmware versions <= 3.5.10

  • An affected version range remains undefined

  • This product appears to no longer be supported

CWE
  • CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVSS
8.7
CVSS V4 Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Credit
Daniel Monzón (stark0de)
Description
Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.