CVE-2022-4985 PUBLISHED

Vodafone H500s WiFi Password Disclosure via activation.json

Assigner: VulnCheck
Reserved: 14.11.2025 Published: 14.11.2025 Updated: 18.11.2025

Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor Vodacom
Product Vodafone H500s
Versions Default: unknown
  • affected from 0 to 3.5.10 (incl.)

Credits

  • Daniel Monzón (stark0de) finder

References

Problem Types

  • CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere CWE