A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com# HG532d RCE Exploit
## Overview
A Remote Code Execution (RCE) exploit based on [CVE-2017-17215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17215) vulnerability. Modded from original PoC code from [exploit-db.com](https://www.exploit-db.com/exploits/43414) to work on Huawei HG532d Home Gateway Routers.
## Description
This RCE exploit is based on CVE-2017-17215 which exploits vulnerabilities
in the UPnP process running on the Huawei HG532 series of home routers. The
original exploit from [exploit-db.com](https://www.exploit-db.com/exploits/43414) targets HG532 Home Routers.
This exploit, with a mod done to the HTTP POST Request, bypasses the input
sanitation done by the router - which allows the original exploit to
work with HG532d routers.
### Description of CVE:
Huawei HG532d with some customized versions has a remote code execution vulnerability.
An authenticated attacker could send malicious packets to port 37215 to launch attacks.
## References
CVE Details: https://nvd.nist.gov/vuln/detail/CVE-2017-17215
Original PoC exploit source: https://www.exploit-db.com/exploits/43414
CheckPoint Vulnerability Report: https://research.checkpoint.com/2017/good-zero-day-skiddie/
Huawei Security Notice: https://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en
[4.0K] /data/pocs/b5cec1bd9b584dd9e2bab8622ca28b231f2ad07d
├── [4.0K] firmware
│ └── [3.9M] HG532dV100R001C213B013_main.bin
├── [2.1K] hg532d_exploit.py
├── [ 395] index.html
├── [1.3K] README.md
└── [4.0K] web_exploit
└── [1.1K] poc_iframe.html
2 directories, 5 files