Huawei EchoLife HG520 Remote Information Disclosure

Huawei EchoLife HG520 Remote Information Disclosure

Posted on May 13 2010   |  Plain text version


Huawei EchoLife HG520 modems are vulnerable to a remote information disclosure vulnerability. This vulnerability can be exploited by sending a specially crafted UDP packet that causes the modems to return sensitive information in clear text form.


# Exploit Title: Huawei EchoLife HG520 Remote Information Disclosure
# Date: 2010-04-19
# Product Link:
# Firmware Versions:
# Software Versions: V100R001B120Telmex
# V100R001B121Telmex
# Exploit Download Link:
Websec Advisory: ws10-10

By sending a specially crafted UDP packet you can remotely obtain the
following information: software and firmware versions, MAC, local and
remote IP, model and PPPoE credentials in clear text.

The files required to reproduce this vulnerability can be downloaded

Requires Python, Scapy and Tcpdump. The way you run this program to test
a local modem is:

~# python

For a remote modem:

~# python

* If you can't see the response packet, try using Wireshark.
* If "No module named all" error shows up, install scapy from source.

[email protected]


Latest Blog Entries

Drive By ONT Botnet with IRC C&C
Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.

(IN)secure session data in CodeIgniter
A security analysis on how web applications created with the PHP framework CodeIgniter handle user sessions.

Panoptic - A tool to exploit path traversal vulnerabilities
An overview of Panoptic, an open source penetration testing tool that automates the process of search and retrieval of common log and config files through path traversal vulnerabilities.

Latest News

Jun 18, 2014
Websec present at Campus Party 2014

Websec will be participating with four conferences at the largest Campus Party ever held, which will take place from the 24-29 of June in Guadalajara, Mexico.

Oct 01, 2013
Websec at DerbyCon 2013
A summary of Websec's participation at DerbyCon 2013 in Louisville, Kentucky.