Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vodafone vodafone H500s
|
|
| CPEs | cpe:2.3:a:vodafone:vodafone_h500s:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vodafone vodafone H500s
|
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sercomm
Sercomm h500s Vodafone Vodafone h500s |
|
| Vendors & Products |
Sercomm
Sercomm h500s Vodafone Vodafone h500s |
Fri, 14 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems. | |
| Title | Vodafone H500s WiFi Password Disclosure via activation.json | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-18T16:17:58.154Z
Reserved: 2025-11-14T21:18:12.405Z
Link: CVE-2022-4985
Updated: 2025-11-18T16:17:41.938Z
Status : Awaiting Analysis
Published: 2025-11-14T23:15:43.447
Modified: 2025-11-18T17:15:57.493
Link: CVE-2022-4985
No data.