This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the plaintext sensitive data stored in the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized network access, retrieve and manipulate data on the targeted device.
History

Wed, 13 Aug 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the plaintext sensitive data stored in the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized network access, retrieve and manipulate data on the targeted device.
Title Information Disclosure Vulnerability in ZKTeco WL20
Weaknesses CWE-312
References
Metrics cvssV4_0

{'score': 5.2, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published: 2025-08-13T11:38:35.843Z

Updated: 2025-08-13T12:59:31.423Z

Reserved: 2025-08-12T11:08:57.777Z

Link: CVE-2025-55280

cve-icon Vulnrichment

Updated: 2025-08-13T12:59:29.130Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T12:15:27.060

Modified: 2025-08-13T17:33:46.673

Link: CVE-2025-55280

cve-icon Redhat

No data.