### [CVE-2017-17215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17215) ![](https://img.shields.io/static/v1?label=Product&message=HG532&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=remote%20code%20execution&color=brighgreen) ### Description Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0bs3rver/learning-with-sakura - https://github.com/1337g/CVE-2017-17215 - https://github.com/ARPSyndicate/cvemon - https://github.com/HimmelAward/Goby_POC - https://github.com/MelanyRoob/Goby - https://github.com/WinMin/Protocol-Vul - https://github.com/Z0fhack/Goby_POC - https://github.com/duggytuxy/malicious_ip_addresses - https://github.com/gobysec/Goby - https://github.com/hktalent/bug-bounty - https://github.com/kal1x/iotvulhub - https://github.com/kd992102/CVE-2017-17275 - https://github.com/lnick2023/nicenice - https://github.com/ltfafei/HuaWei_Route_HG532_RCE_CVE-2017-17215 - https://github.com/ltfafei/ltfafei - https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document - https://github.com/pandazheng/MiraiSecurity - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/retr0-13/Goby - https://github.com/tharsis1024/study-note - https://github.com/tom0li/collection-document - https://github.com/wilfred-wulbou/HG532d-RCE-Exploit - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xuguowong/Mirai-MAL