CVE-2022-4985
Vodafone H500s WiFi Password Disclosure via activation.json
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Vodafone H500s devices running firmware v3.5.10 (hardware model Sercomm VFH500) expose the WiFi access point password via an unauthenticated HTTP endpoint. By sending a crafted GET request to /data/activation.json with specific headers and cookies, a remote attacker can retrieve a JSON document that contains the wifi_password field. This allows an unauthenticated attacker to obtain the WiFi credentials and gain unauthorized access to the wireless network, compromising confidentiality of network traffic and attached systems.
| CWE | CWE-497 |
| Vendor | vodacom |
| Product | vodafone h500s |
| Published | Nov 14, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for vodacom vodafone h500s
Be the first to know when new unknown vulnerabilities affecting vodacom vodafone h500s are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
Affected Versions
Vodacom / Vodafone H500s
0 β€ 3.5.10
References
exploit-db.com: https://www.exploit-db.com/exploits/50636 cxsecurity.com: https://cxsecurity.com/issue/WLB-2022010024 help.vodacom.co.za: https://help.vodacom.co.za/personal/home/61/9493/1023659/Vodafone-H500s-WiFi-router vulncheck.com: https://www.vulncheck.com/advisories/vodafone-h500s-wifi-password-disclosure-via-activation-json
Credits
Daniel MonzΓ³n (stark0de)