<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Iot on Corvus Blog</title><link>https://nicoleman0.github.io/blog-site/tags/iot/</link><description>Recent content in Iot on Corvus Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 28 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://nicoleman0.github.io/blog-site/tags/iot/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2017-17215</title><link>https://nicoleman0.github.io/blog-site/posts/iot_exploit_blog_post/</link><pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate><guid>https://nicoleman0.github.io/blog-site/posts/iot_exploit_blog_post/</guid><description>&lt;h2 id="attack-summary">Attack Summary&lt;/h2>
&lt;p>On January 28, 2026 at 21:01:11 UTC, IP address 60[.]19[.]220[.]0 attempted to exploit my ICS honeypot with CVE-2017-17215, a remote code execution vulnerability in Huawei HG532 routers. The attack targeted &lt;code>/boaform/admin/formLogin&lt;/code> with default credentials (&lt;code>username=user&amp;amp;psd=user&lt;/code>) via HTTP/1.0.&lt;/p>
&lt;p>The IP has two recent reports on AbuseIPDB, indicating active malicious scanning.&lt;/p>
&lt;h2 id="cve-2017-17215">CVE-2017-17215&lt;/h2>
&lt;p>CVE-2017-17215 is a remote code execution flaw in Huawei HG532 home gateways discovered in November 2017. The vulnerability exists in the router&amp;rsquo;s UPnP implementation, where the TR-064 protocol (designed for local network configuration) was exposed to the WAN through port 37215&lt;sup id="fnref:1">&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref">1&lt;/a>&lt;/sup>.&lt;/p></description></item></channel></rss>