This is the most significant vulnerability associated with the HG532 series. Attackers can exploit the TR-064 protocol (used for remote management) to inject malicious commands and take full control of the router.
The HG532e was famously targeted by variants of the Mirai botnet (like Satori), which turned these routers into "zombies" for launching DDoS attacks.
Older firmware versions allowed unauthenticated attackers to access internal system files by manipulating the /icon/ path in requests. How to Update Your Huawei HG532e
Huawei HG532e Firmware Update: Resolving Security Risks and Stability Issues
Не хватает прав доступа к веб-форме.
Не хватает прав доступа к веб-форме.