Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query the /api/system/deviceinfo endpoint without authentication to extract the SerialNumber field, then use the last 8 characters as the default password to login to the router.
Metrics
Affected Vendors & Products
References
History
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Huawei
Huawei hg630 Router |
|
| Vendors & Products |
Huawei
Huawei hg630 Router |
Thu, 14 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query the /api/system/deviceinfo endpoint without authentication to extract the SerialNumber field, then use the last 8 characters as the default password to login to the router. | |
| Title | Huawei HG630 V2 Router Authentication Bypass via Serial Number | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-05-13T14:22:32.238Z
Updated: 2026-05-14T13:41:47.818Z
Reserved: 2026-05-13T13:49:58.352Z
Link: CVE-2020-37220
Updated: 2026-05-14T13:41:44.032Z
Status : Deferred
Published: 2026-05-13T16:16:33.423
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37220
No data.