6.5
CVSSv2

CVE-2017-17215

Published: 20/03/2018 Updated: 19/04/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 658
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

huawei hg532_firmware -

Exploits

import threading, sys, time, random, socket, re, os, struct, array, requests from requestsauth import HTTPDigestAuth ips = open(sysargv[1], "r")readlines() cmd = "" # Your MIPS (SSHD) rm = "<?xml version=\"10\" ?>\n <s:Envelope xmlns:s=\"schemasxmlsoaporg/soap/envelope/\" s:encodingStyle=\"schemasxmlsoaporg/soap/en ...

Github Repositories

A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com

HG532d RCE Exploit Overview A Remote Code Execution (RCE) exploit based on CVE-2017-17215 vulnerability Modded from original PoC code from exploit-dbcom to work on Huawei HG532d Home Gateway Routers Description This RCE exploit is based on CVE-2017-17215 which exploits vulnerabilities in the UPnP process running on the Huawei HG532 series of home routers The original explo

study-note 2023316 抛出问题: plt表和got表有什么区别 32位栈和64位栈有什么区别,描述一下他们调用函数时所进行的行为 32位栈的利用和64位栈的利用有什么区别 Bss段是什么 什么情况会导致栈溢出,写出常见危险函数 2023317 对照着问题稍微能给出了答案,感觉基础还是太薄弱了,明天把练习

Mirai

MiraiSecurity Mirai wwwcdxyme/?p=746 wwwfreebufcom/articles/network/119403html pastebincom/svH8tvd9 wwwfreebufcom/sectool/130091html wwwtuicoolcom/articles/qM7rMnb h4ckth4tsh1tcom/indexphp?u=/topic/18/ggsetup-a-mirai-botnet githubcom/rootblack45/Mirai-Source-Modded githubcom/Screamfox/-Mirai-Iot-BotNet

在skr_uni的学习经历

这是什么? 这是一份 skr_university 的学习记录 用以记录和鞭策自己在忙完学校与生活事情之余不要懈怠 由于时间比较久,所以前面是周报,后面是日报 learning_list 2020726: week 1 学习两部南京大学的计算机系统基础课 南京大学计算机系统基础MOOC(一) :操作系统概述、运算与基础 南

POCsuite与goland实现华为HG532路由器命令注入CVE-2017-17215 POC

HuaWei_Route_HG532_RCE_CVE-2017-17215 POCsuite与goland实现华为HG532路由器命令注入CVE-2017-17215 POC goland实现 POCsuite实现 编写和代码请移步: blogcsdnnet/qq_41490561/article/details/127659604

CVE-2017-17215 HuaWei Router RCE (NOT TESTED)

CVE-2017-17215 Usage: CVE-2017-12149py targetip:37215/ I am so poor that cant afford to but a HUAWEI router XD so it is not tested on any machine~ but the exp technically should be working I found this report blognewskysecuritycom/huawei-router-exploit-involved-in-satori-and-brickerbot-given-away-for-free-on-christmas-by-ac52fe5e4516 the payload was released 2

These are the IP addresses of the most active C2/Botnets/Zombies/Scanners in European Cyber Space

Malicious IP Addresses These are the IP addresses of the most active Botnets/Zombies/Scanners in European Cyber Space All lists available blacklist_ips_for_fortinet_firewall_aatxt blacklist_ips_for_fortinet_firewall_abtxt botnets_zombies_scanner_spam_ipstxt (full list) botnets_zombies_scanner_spam_ips_ipv6txt (soon !!!) Categories SSH Brute Forcers FortiOS CVE | RCE Exploi

Security Collecttion

安全项目收集,在此处收集一些Github以及其他开源项目 Tips:很多都是Star中的,可以去我的Star里面看看 安全扫描工具 XRAY 说明:一款功能强大的安全评估工具 功能:XSS检测、SQL注入、命令/代码注入检测、目录枚举、弱口令检测 详情 RAD 说明:Rad主要是可以通过爬取网站的URL,泛洪辐射

Iot-vulhub 自建镜像版

iotvulhub自建镜像使用指南 本项目根据 firmianay/IoT-vulhub 进行加工,原作者删除了 dockerhub 中的镜像,我在本地构建后重新上传 iotvulhub自建镜像使用指南 目前可用镜像 提交镜像方法 准备工作 部分漏洞复现 TP-Link WR841N 栈溢出漏洞(CVE-2020-8423) Tenda AC15 栈溢出漏洞(CVE-2018-16333) 遇到

Recent Articles

Huawei's half-arsed router patching left kit open to botnets: Chinese giant was warned years ago – then bungled it
The Register • Gareth Corfield • 28 Mar 2019

ISP alerted biz to UPnP flaw in 2013. Years later, same flaw kept cropping up

Exclusive Huawei bungled its response to warnings from an ISP's code review team about a security vulnerability common across its home routers – patching only two models rather than all of its products that used the same flawed firmware. Years later, those unpatched Huawei gateways, still vulnerable and still in use by broadband subscribers around the world, were caught up in a Mirai-variant botnet that exploited the very same hole flagged up earlier by the ISP's review team. The Register has ...