CVE-2022-4985

Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
CVSS

No CVSS.

Configurations

No configuration.

History

18 Nov 2025, 17:15

Type Values Removed Values Added
References () https://cxsecurity.com/issue/WLB-2022010024 - () https://cxsecurity.com/issue/WLB-2022010024 -
References () https://www.exploit-db.com/exploits/50636 - () https://www.exploit-db.com/exploits/50636 -

14 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-14 23:15

Updated : 2025-11-18 17:15


NVD link : CVE-2022-4985

Mitre link : CVE-2022-4985

CVE.ORG link : CVE-2022-4985


JSON object : View

Products Affected

No product.

CWE
CWE-497

Exposure of Sensitive System Information to an Unauthorized Control Sphere