16 posts
|
Post by wangyueyue on Jul 16, 2018 5:49:07 GMT
New variant virus is eyeing Huawei routerCheck Point found a vulnerability in the Huawei home router HG532 (CVE-2017-17215), which was exploited by Nexus Zeta to spread the Mirai variant Mirai Okiru / Satori. Since then, Huawei has released updated security notifications to customers, warning that the vulnerability allows remote attackers to send malicious packets to port 37215 to execute remote code on vulnerable routers. дешевая цена fdd tdd lte huawei e5180 портативный 4g lte wifi"This code is now known to all kinds of black hats. Just like the SOAP vulnerability that was previously released to the public for free, it will be used by hackers," Anubhav said. NewSky Security released a blog on Thursday outlining its discovery of zero-day code. huawei s5720 32c hi 24s ac 24 puertos gigabit ethernet switchThe root cause is a bug related to SOAP, which is the protocol used by many IoT devices, Anubhav said. Early SOAP (CVE-2014-8361 and TR-064) issues affected different vendors and were widely used by Mirai variants. Brands New Huawei S5720 56Pc Ei Ac Sfp Layer 3 Network SwitchIn the case of CVE-2017-17215, this zero day took advantage of how Huawei routers use the Universal Plug and Play (UPnP) protocol and the TR-064 Technical Reporting Standard. The TR-064 is a standard that makes it easy to add embedded UPnP devices to your local network. S3700 52P Si Ac Huawei S3700 52P Si Ac 02352370
|
|