Vulnerability Note VU#438928
Huawei HG532 routers contain a path traversal vulnerability
Original Release date: 06 Nov 2015 | Last revised: 09 Nov 2015
Huawei HG532 routers, including the HG532e, n, s, and possibly other models, are vulnerable to arbitrary file access through path traversal.
CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) – CVE-2015-7254
In vulnerable Huawei router models, the /icon/ path of requests to Internet-facing TCP port 37215 can be manipulated to gain access to arbitrary files. For instance, a remote, unauthenticated attacker could read the inittab file by directly requesting http://<target_IP>:37215/icon/../../../etc/inittab.
A LAN-based attacker can access arbitrary files on vulnerable devices. Note that in some configurations, an external attacker may be able to leverage this vulnerability.
Apply an update
The vendor is in the process of releasing firmware updates to carriers to address this vulnerability. Users are encouraged to contact their carrier to obtain the latest release, but should consider the following workaround when a patch is unavailable.
As a general good security practice, only allow connections from trusted hosts and networks.
Vendor Information (Learn More)
VendorStatusDate NotifiedDate UpdatedHuawei TechnologiesAffected03 Sep 201509 Nov 2015If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
Thanks to Roberto Paleari and Aristide Fattori for reporting this vulnerability.
This document was written by Joel Land.
06 Nov 2015
Date First Published:
06 Nov 2015
Date Last Updated:
09 Nov 2015
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.