Huawei HG630 V2 Router Authentication Bypass Vulnerability (CVE-2020-37220)
Huawei HG630 V2 router contains an authentication bypass vulnerability (CVE-2020-37220) that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number via the `/api/system/deviceinfo` endpoint and using the last 8 characters as the default password.
The Huawei HG630 V2 router is vulnerable to an authentication bypass issue (CVE-2020-37220). An unauthenticated attacker can exploit this vulnerability to gain administrative access to the router. By querying the /api/system/deviceinfo endpoint, an attacker can retrieve the device’s serial number. The last 8 characters of this serial number are then used as the default password for administrative login. This vulnerability allows unauthorized modification of router settings and potential compromise of the network. This issue was reported on May 13, 2026.
Attack Chain
- An unauthenticated attacker sends a GET request to the
/api/system/deviceinfoendpoint on the Huawei HG630 V2 router. - The router responds with device information, including the
SerialNumberfield, without requiring authentication. - The attacker extracts the
SerialNumbervalue from the response. - The attacker isolates the last 8 characters of the extracted
SerialNumber. - The attacker attempts to log in to the router’s administrative interface via a web browser.
- The attacker uses “admin” as the username and the last 8 characters of the
SerialNumberas the password. - If the default credentials have not been changed, the attacker successfully authenticates as an administrator.
- The attacker gains full administrative access to the router and can modify settings, potentially compromising the network.
Impact
Successful exploitation of CVE-2020-37220 allows an unauthenticated attacker to gain complete administrative control of the Huawei HG630 V2 router. This access enables the attacker to modify router settings, intercept network traffic, conduct man-in-the-middle attacks, or use the compromised device as a pivot point for further attacks within the network. The lack of authentication on a critical endpoint makes this vulnerability particularly severe, potentially impacting a large number of users relying on this router model.
Recommendation
- Deploy the Sigma rule
Detect Huawei HG630 V2 Device Info Requestto monitor for suspicious requests to the/api/system/deviceinfoendpoint. - Deploy the Sigma rule
Detect Huawei HG630 V2 Successful Admin Loginto identify successful logins using credentials derived from the serial number. - Apply configuration changes to restrict access to the
/api/system/deviceinfoendpoint if possible based on the device capabilities. - Monitor webserver logs for requests to
/api/system/deviceinfoand correlate with subsequent login attempts.
Detection coverage 2
Detect Huawei HG630 V2 Device Info Request
mediumDetects requests to the /api/system/deviceinfo endpoint on Huawei HG630 V2 routers, potentially indicating an attempt to retrieve the serial number for authentication bypass (CVE-2020-37220).
Detect Huawei HG630 V2 Successful Admin Login
highDetects successful login to Huawei HG630 V2 router web interface after accessing /api/system/deviceinfo. This is based on the assumption the attacker is using the Serial Number.
Detection queries are available on the platform. Get full rules →