Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-17215 PoC — Huawei HG532 安全漏洞

Source
Associated Vulnerability
Title:Huawei HG532 安全漏洞 (CVE-2017-17215)
Description:Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code.
Description
POCsuite与goland实现华为HG532路由器命令注入CVE-2017-17215 POC
Readme
# HuaWei_Route_HG532_RCE_CVE-2017-17215
POCsuite与goland实现华为HG532路由器命令注入CVE-2017-17215 POC

## goland实现
![image](https://user-images.githubusercontent.com/43526141/199515455-f98b8e27-8f68-4895-a954-020e45c804bc.png)


## POCsuite实现
![image](https://user-images.githubusercontent.com/43526141/199515541-4d24e424-c12d-4443-9420-5ad0e4f19c75.png)


### 编写和代码请移步:
https://blog.csdn.net/qq_41490561/article/details/127659604
File Snapshot

[4.0K] /data/pocs/c3e87b4cfc68b8ab1c3d54e044575ddb31c65919 ├── [4.0K] firmware │   ├── [3.9M] HG532dV100R001C213B013_main.bin │   └── [3.4M] HG532eV100R001C01B020_upgrade_packet.bin ├── [6.0M] HG532_RCE_linux_386 ├── [6.4M] HG532_RCE_linux_amd64 ├── [6.0M] HG532_RCE_Win.exe └── [ 469] README.md 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →