Check Point found a vulnerability in the Huawei home router HG532 (CVE-2017-17215), which was exploited by Nexus Zeta to spread the Mirai variant Mirai Okiru / Satori. Since then, Huawei has released updated security notifications to customers, warning that the vulnerability allows remote attackers to send malicious packets to port 37215 to execute remote code on vulnerable routers.New variant virus is eyeing Huawei routerCheck Point found a vulnerability in the Huawei home router HG532 (CVE-2017-17215), which was exploited by Nexus Zeta to spread the Mirai variant Mirai Okiru / Satori. Since then, Huawei has released updated security notifications to customers, warning that the vulnerability allows remote attackers to send malicious packets to port 37215 to execute remote code on vulnerable routers.
низкая цена gpfd ma5608t ma5683t ma5680t 16 портовая интерфейсная плата gpon olt "This code is now known to all kinds of black hats. Just like the SOAP vulnerability that was previously released to the public for free, it will be used by hackers," Anubhav said. NewSky Security released a blog on Thursday outlining its discovery of zero-day code.
huawei ma5818 de alta capacidad 10 gbit s red óptica pasiva pon unidades de red óptica onus The root cause is a bug related to SOAP, which is the protocol used by many IoT devices, Anubhav said. Early SOAP (CVE-2014-8361 and TR-064) issues affected different vendors and were widely used by Mirai variants.
Huawei S3700 52P EI 24S AC switch, View S3700 52P EI 24S In the case of CVE-2017-17215, this zero day took advantage of how Huawei routers use the Universal Plug and Play (UPnP) protocol and the TR-064 Technical Reporting Standard. The TR-064 is a standard that makes it easy to add embedded UPnP devices to your local network.
S5720 28Tp Li Ac Huawei S5720 28Tp Li Ac 98010639