vendor:
E960 HSDPA Router
by:
Rizki Wicaksono
8.8
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: E960 HSDPA Router
Affected Version From: 246.11.04.11.110sp04
Affected Version To: 246.11.04.11.110sp04
Patch Exists: NO
Related CWE: N/A
CPE: h:huawei:e960_hsdpa_router
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2012
XSS Attack using SMS to Optus/Huawei E960 HSDPA Router
Huawei E960 HSDPA Router (firmware version 246.11.04.11.110sp04) is vulnerable to XSS attack using SMS. One of the feature of this router is the ability to send and receive SMS through its web interface. The SMS text is presented unescaped/unfiltered on the inbox view, and an attacker can craft malicious short messages to gain control over victims router. The first 32 characters of every incoming SMS is presented in unescaped form in the inbox view. The 32 characters limit can be overcome by using several messages, and inserting javascript comment to merge the current message with the next one.
Mitigation:
To remove offending messages from the inbox, telnet to the router with username 'admin' and password 'admin'. Huawei E960 uses busybox shell, so standard rm command can be used to remove the messages (it is located at /tmp/sms/inbox_sms). After removing the message content, the deleted messages will still be in the inbox index, but it can now be removed from the inbox page.