SHARE
Facebook X Pinterest WhatsApp

Huawei Router Exploit Code Used in IoT Botnet Made Public

thumbnail
Huawei Router Exploit Code Used in IoT Botnet Made Public

Hackers released the code for a Huawei vulnerability over Christmas. The vulnerability could be exploited by botnet attacks.

Written By
thumbnail
Sue Walsh
Sue Walsh
Jan 5, 2018

According to researchers at NewSky Security, the code from the Satori IoT botnet was publically released by a known threat actor over Christmas. The code, which exploits a vulnerability in Huawei routers, has been used in both the Satori and Brickerbot botnets, the company said in a blog post. The vulnerability, which was shut down by ISPs last month, was discovered by security firm Check Point in November. They promptly reported the issue to Huawei.

“An authenticated attacker could send malicious packets to port 37215 to launch attacks. A successful exploit could lead to the remote execution of arbitrary code,” Huawei said.

Blocking Botnet Attacks

Check Point reported that the root cause of the flaw is linked to Huawei’s implementation of the “Universal Plug and Play” protocol via the TR-064 technical report standard. Huawei implementation allowed remote attackers to inject arbitrary commands, which hackers used to build the Satori botnet, said NewSky in their blog post.

See also: Hackers behind Mirai botnet plead guilty

Maya Horowitz, Threat Intelligence Group Manager at Check Point, said “[Users should] change the default password on their router,” and recommends that end users running Huawei routers behind a firewall or Intrusion Prevention System should configure those devices to block the exploit’s traffic.”

To protect the devices against CVE-2017–17215, Huawei has released a security notice which can be accessed here. In it, they address the vulnerability and advise users on how to protect themselves. Some of the advice is common sense, such as changing the default username and password, something that should always be done when setting up a new internet connected device of any kind. The company said their investigation into the matter is not yet completed but promised to continue providing updates as quickly as possible.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Security, Next-gen Technology, and AI-powered Insights: 2026 Predictions for Satellite IoT
Alastair MacLeod
Jan 16, 2026
U.S. Cyber Trust Mark: Evolving IoT from Smart to Secure
Matt Wyckhouse
Aug 24, 2024
80% Organizations Had A Cloud Security Incident in 2021
David Curry
Oct 10, 2022
Digital Twins Require Their Own Special Brand of Security
Joe McKendrick
Oct 10, 2022

Featured Resources from Cloud Data Insights

Why Agentic AI Projects Are Getting Canceled (And How You Can Save Yours)
Akhil Verghese
Mar 2, 2026
Real-time Analytics News for the Week Ending February 28
Platform-First Enterprise AI: Turning Data Islands into Autonomous Intelligence
Arvind Rao
Feb 27, 2026
Will Your Organization Take the Quantum Leap in 2026? Read This First.
David McNeely
Feb 26, 2026

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.