Description
Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query the /api/system/deviceinfo endpoint without authentication to extract the SerialNumber field, then use the last 8 characters as the default password to login to the router.
Problem types
Product status
Credits
Eslam Medhat
References
www.exploit-db.com/exploits/48310 (ExploitDB-48310)
www.youtube.com/watch?v=vOrIL7L_cVc (Reference)
www.vulncheck.com/...authentication-bypass-via-serial-number (VulnCheck Advisory: Huawei HG630 V2 Router Authentication Bypass via Serial Number)