SHARE
Facebook X Pinterest WhatsApp

Huawei Router Exploit Code Used in IoT Botnet Made Public

thumbnail
Huawei Router Exploit Code Used in IoT Botnet Made Public

Hackers released the code for a Huawei vulnerability over Christmas. The vulnerability could be exploited by botnet attacks.

Written By
thumbnail
Sue Walsh
Sue Walsh
Jan 5, 2018

According to researchers at NewSky Security, the code from the Satori IoT botnet was publically released by a known threat actor over Christmas. The code, which exploits a vulnerability in Huawei routers, has been used in both the Satori and Brickerbot botnets, the company said in a blog post. The vulnerability, which was shut down by ISPs last month, was discovered by security firm Check Point in November. They promptly reported the issue to Huawei.

“An authenticated attacker could send malicious packets to port 37215 to launch attacks. A successful exploit could lead to the remote execution of arbitrary code,” Huawei said.

Blocking Botnet Attacks

Check Point reported that the root cause of the flaw is linked to Huawei’s implementation of the “Universal Plug and Play” protocol via the TR-064 technical report standard. Huawei implementation allowed remote attackers to inject arbitrary commands, which hackers used to build the Satori botnet, said NewSky in their blog post.

See also: Hackers behind Mirai botnet plead guilty

Maya Horowitz, Threat Intelligence Group Manager at Check Point, said “[Users should] change the default password on their router,” and recommends that end users running Huawei routers behind a firewall or Intrusion Prevention System should configure those devices to block the exploit’s traffic.”

To protect the devices against CVE-2017–17215, Huawei has released a security notice which can be accessed here. In it, they address the vulnerability and advise users on how to protect themselves. Some of the advice is common sense, such as changing the default username and password, something that should always be done when setting up a new internet connected device of any kind. The company said their investigation into the matter is not yet completed but promised to continue providing updates as quickly as possible.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

U.S. Cyber Trust Mark: Evolving IoT from Smart to Secure
Matt Wyckhouse
Aug 24, 2024
80% Organizations Had A Cloud Security Incident in 2021
David Curry
Oct 10, 2022
Digital Twins Require Their Own Special Brand of Security
Joe McKendrick
Oct 10, 2022
New Report Highlights $14 Billion IoT IAM Market

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.