2017
04.18

Huawei HG532n Command Injection

This Metasploit module exploits a command injection vulnerability in the Huawei HG532n routers provided by TE-Data Egypt, leading to a root shell. The router’s web interface has two kinds of logins, a “limited” user:user login given to all customers and an admin mode. The limited mode is used here to expose the router’s telnet port to the outside world through NAT port-forwarding. With telnet now remotely accessible, the router’s limited “ATP command line tool” (served over telnet) can be upgraded to a root shell through an injection into the ATP’s hidden “ping” command.

No Comment.

Add Your Comment

You must be logged in to post a comment.