| Remote credential and information disclosure in modems Huawei HG5XX nmap -p80 -script http-huawei-hg5xx-vuln Ĩ0/tcp open http Huawei aDSL modem EchoLife HG530 (V100R001B122gTelmex) 4.07 - UPnP/1.0 (ZyXEL ZyWALL 2).See the documentation for the vulns library. See the documentation for the smbauth library. smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername See the documentation for the http library. http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, uncated-ok, eragent See the documentation for the slaxml library. Vulnerability was discovered by Pedro Joaquin ( ). One was discovered and reported byĪdiaz from Comunidad Underground de Mexico ( ) and itĪllows attackers to extract the pppoe password. This script exploits two vulnerabilities. Model, gateway, dns servers and active connections among other values. ItĪlso extracts the PPPoE credentials and other interesting configuration values.Īttackers can query the URIs "/Listadeparametros.html" and "/wanfun.js" toĮxtract sensitive information including PPPoE credentials, firmware version, Vulnerable to a remote credential and information disclosure vulnerability. Script Arguments Example Usage Script Output Script http-huawei-hg5xx-vulnĭetects Huawei modems models HG530x, HG520x, HG510x (and possibly others.)
0 Comments
Leave a Reply. |