Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
CVSS
No CVSS.
References
Configurations
No configuration.
History
18 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cxsecurity.com/issue/WLB-2022010024 - | |
| References | () https://www.exploit-db.com/exploits/50636 - |
14 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-14 23:15
Updated : 2025-11-18 17:15
NVD link : CVE-2022-4985
Mitre link : CVE-2022-4985
CVE.ORG link : CVE-2022-4985
JSON object : View
Products Affected
No product.
CWE
CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
