Vulnerability Details : CVE-2020-12123
CSRF vulnerabilities in the /cgi-bin/ directory of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to remotely access router endpoints, because these endpoints do not contain CSRF tokens. If a user is authenticated in the router portal, then this attack will work.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2020-12123
- cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12123
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12123
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:M/Au:N/C:N/I:P/A:C |
8.6
|
7.8
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H |
2.8
|
5.2
|
NIST |
CWE ids for CVE-2020-12123
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-12123
-
https://www.wavlink.com/en_us/product/WL-WN530H4.html
WL-WN530H4 AC1200 High Power Dual Band Wireless Router - WAVLINK See the world! Powered by WavlinkProduct;Vendor Advisory
-
https://cerne.xyz/bugs/CVE-2020-12123
Christopher Cerne | CVE-2020-12123Third Party Advisory
Jump to