Skip to content

wilfred-wulbou/HG532d-RCE-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HG532d RCE Exploit

Overview

A Remote Code Execution (RCE) exploit based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com to work on Huawei HG532d Home Gateway Routers.

Description

This RCE exploit is based on CVE-2017-17215 which exploits vulnerabilities in the UPnP process running on the Huawei HG532 series of home routers. The original exploit from exploit-db.com targets HG532 Home Routers.

This exploit, with a mod done to the HTTP POST Request, bypasses the input sanitation done by the router - which allows the original exploit to work with HG532d routers.

Description of CVE:

Huawei HG532d with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks.

References

CVE Details: https://nvd.nist.gov/vuln/detail/CVE-2017-17215

Original PoC exploit source: https://www.exploit-db.com/exploits/43414

CheckPoint Vulnerability Report: https://research.checkpoint.com/2017/good-zero-day-skiddie/

Huawei Security Notice: https://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en

About

A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published