Huawei EchoLife HG520 Remote Information Disclosure

ID SSV:68362
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00


No description provided by source.

                                                # Exploit Title: Huawei EchoLife HG520 Remote Information Disclosure
# Date: 2010-04-19
# Author: hkm
# Product Link:
# Firmware Versions:
# Software Versions: V100R001B120Telmex
#                    V100R001B121Telmex
# Exploit Download Link:

By sending a specially crafted UDP packet you can remotely obtain the
following information: software and firmware versions, MAC, local and
remote IP, model and PPPoE credentials in clear text.

The files required to reproduce this vulnerability can be downloaded

Requires Python, Scapy and Tcpdump. The way you run this program to test
a local modem is:

  ~# python

For a remote modem:

  ~# python <remoteIP>

* If you can't see the response packet, try using Wireshark.
* If "No module named all" error shows up, install scapy from source.


 [ Comunidad Underground de Mexico - ]