Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Metrics
Affected Vendors & Products
References
History
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sercomm
Sercomm h500s Vodafone Vodafone h500s |
|
| Vendors & Products |
Sercomm
Sercomm h500s Vodafone Vodafone h500s |
Fri, 14 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems. | |
| Title | Vodafone H500s WiFi Password Disclosure via activation.json | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-11-14T22:49:13.629Z
Updated: 2025-11-14T22:49:13.629Z
Reserved: 2025-11-14T21:18:12.405Z
Link: CVE-2022-4985
No data.
Status : Received
Published: 2025-11-14T23:15:43.447
Modified: 2025-11-14T23:15:43.447
Link: CVE-2022-4985
No data.