Huawei EchoLife HG520c Information Disclosure

Huawei EchoLife HG520c Information Disclosure

Posted on May 16 2010   |  Plain text version

Summary

Huawei EchoLife HG520 modems are vulnerable to an information disclosure vulnerability. Sensitive modem information can be accessed using a public URL in modems with the web interface activated.

Description

===========================================
HUAWEI ECHOLIFE HG520c Information Disclosure
===========================================

Device: EchoLife HG520c
Software Version: V100R001B021Telmex
V100R001B020Telmex
Firmware Version: 3.10.18.7-1.0.7.0 (ultima version)
3.10.18.5-1.0.7.0
Vulnerable Models: HG520c
Publication date: 2010-05-16
Criticality level: Low
Impact: Information Disclosure
Where: Web administration interface (LAN/WAN)
Websec Advisory: ws10-11


[Description]
=================
The page '/Listadeparametros.html' reveals important information such as
software version, internal IP, SSID, etc. No authentication is required.


[Exploit]
=================
From LAN or Client-Side just open '/Listadeparametros.html':

http://192.168.1.254/Listadeparametros.html

In case of having the admin interface enabled in WAN:

http:///Listadeparametros.html

POC

http://192.168.1.254/Listadeparametros.html

http:///Listadeparametros.html


Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.