Vulnerability Description
Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query the /api/system/deviceinfo endpoint without authentication to extract the SerialNumber field, then use the last 8 characters as the default password to login to the router.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/48310
- https://www.vulncheck.com/advisories/huawei-hg630-v2-router-authentication-bypas
- https://www.youtube.com/watch?v=vOrIL7L_cVc
FAQ
What is CVE-2020-37220?
CVE-2020-37220 is a vulnerability with a CVSS score of 7.5 (HIGH). Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query...
How severe is CVE-2020-37220?
CVE-2020-37220 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-37220?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.