{"vuid":"VU#438928","idnumber":"438928","name":"Huawei HG532 routers contain a path traversal vulnerability","keywords":["huawei","path traversal"],"overview":"Huawei HG532 routers, including the HG532e, n, s, and possibly other models, are vulnerable to arbitrary file access through path traversal.","clean_desc":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-7254 In vulnerable Huawei router models, the /icon/ path of requests to Internet-facing TCP port 37215 can be manipulated to gain access to arbitrary files. For instance, a remote, unauthenticated attacker could read the inittab file by directly requesting http://<target_IP>:37215/icon/../../../etc/inittab.","impact":"A LAN-based attacker can access arbitrary files on vulnerable devices. Note that in some configurations, an external attacker may be able to leverage this vulnerability.","resolution":"Apply an update The vendor is in the process of releasing firmware updates to carriers to address this vulnerability. Users are encouraged to contact their carrier to obtain the latest release, but should consider the following workaround when a patch is unavailable.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks.","sysaffected":"","thanks":"Thanks to Roberto Paleari and Aristide Fattori for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/hw-460507.htm","https://cwe.mitre.org/data/definitions/22.html"],"cveids":["CVE-2015-7254"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-09-02T18:31:03Z","publicdate":"2015-11-06T00:00:00Z","datefirstpublished":"2015-11-06T13:00:25Z","dateupdated":"2015-11-09T14:20:19Z","revision":20,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"N","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"3.3","cvss_basevector":"AV:A/AC:L/Au:N/C:P/I:N/A:N","cvss_temporalscore":"2.7","cvss_environmentalscore":"2.04172443225576","cvss_environmentalvector":"CDP:N/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}