CVE-2017-7315

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to download router backup files containing plaintext credentials on Humax Digital HG100R devices. Attackers can extract administrative credentials and gain full control of affected routers. Only users of Humax Digital HG100R routers with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Humax Digital HG100R
Versions: 2.0.6
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected by default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attackers to intercept all network traffic, redirect DNS, install malware, and use the router as a pivot point into the internal network.

🟠

Likely Case

Attackers gain administrative access to the router, change settings, monitor network traffic, and potentially compromise connected devices.

🟢

If Mitigated

If network segmentation isolates the router management interface and strong perimeter controls exist, impact is limited to router configuration changes.

🌐 Internet-Facing: HIGH - Router management interfaces are typically internet-facing, allowing remote attackers to exploit this without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if they reach the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to download the backup file and parsing the plaintext credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider replacing affected devices with supported models.

🔧 Temporary Workarounds

Disable remote management

all

Disable WAN-side access to router management interface

Change default credentials

all

Change router administrative credentials to strong, unique passwords

🧯 If You Can't Patch

  • Replace affected routers with supported models from different vendors
  • Implement network segmentation to isolate router management interface

🔍 How to Verify

Check if Vulnerable:

Attempt to download GatewaySettings.bin backup file via HTTP without authentication from router IP

Check Version:

Check router web interface or documentation for firmware version

Verify Fix Applied:

Verify backup file download requires authentication or returns error

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful backup file download
  • Unauthenticated requests to backup/download endpoints

Network Indicators:

  • HTTP GET requests to router IP for GatewaySettings.bin or backup endpoints without authentication headers

SIEM Query:

source_ip="router_ip" AND (uri="*GatewaySettings.bin*" OR uri="*backup*" OR uri="*download*") AND NOT auth_success="true"

🔗 References

📤 Share & Export