Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-17215 PoC — Huawei HG532 安全漏洞

Source
Associated Vulnerability
Title:Huawei HG532 安全漏洞 (CVE-2017-17215)
Description:Huawei HG532是中国华为(Huawei)公司的一款无线路由器产品。 Huawei HG532中存在远程代码执行漏洞。远程攻击者可通过向设备37215端口发送恶意报文利用漏洞执行任意代码。
Description
A Remote Code Execution (RCE) exploit for Huawei HG532d based on CVE-2017-17215 vulnerability. Modded from original PoC code from exploit-db.com
Readme
# HG532d RCE Exploit

## Overview
A Remote Code Execution (RCE) exploit based on [CVE-2017-17215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17215) vulnerability. Modded from original PoC code from [exploit-db.com](https://www.exploit-db.com/exploits/43414) to work on  Huawei HG532d Home Gateway Routers.

## Description
This RCE exploit is based on CVE-2017-17215 which exploits vulnerabilities
in the UPnP process running on the Huawei HG532 series of home routers. The
original exploit from [exploit-db.com](https://www.exploit-db.com/exploits/43414) targets HG532 Home Routers.

This exploit, with a mod done to the HTTP POST Request, bypasses the input 
sanitation done by the router - which allows the original exploit to 
work with HG532d routers.

### Description of CVE:
Huawei HG532d with some customized versions has a remote code execution vulnerability. 
An authenticated attacker could send malicious packets to port 37215 to launch attacks.


## References
CVE Details: https://nvd.nist.gov/vuln/detail/CVE-2017-17215

Original PoC exploit source: https://www.exploit-db.com/exploits/43414

CheckPoint Vulnerability Report: https://research.checkpoint.com/2017/good-zero-day-skiddie/

Huawei Security Notice: https://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en
File Snapshot

[4.0K] /data/pocs/b5cec1bd9b584dd9e2bab8622ca28b231f2ad07d ├── [4.0K] firmware │   └── [3.9M] HG532dV100R001C213B013_main.bin ├── [2.1K] hg532d_exploit.py ├── [ 395] index.html ├── [1.3K] README.md └── [4.0K] web_exploit └── [1.1K] poc_iframe.html 2 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.