Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query the /api/system/deviceinfo endpoint without authentication to extract the SerialNumber field, then use the last 8 characters as the default password to login to the router.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Huawei HG630 V2 router contains an authentication bypass vulnerability that allows unauthenticated attackers to obtain administrative access by retrieving the device serial number. Attackers can query the /api/system/deviceinfo endpoint without authentication to extract the SerialNumber field, then use the last 8 characters as the default password to login to the router. | |
| Title | Huawei HG630 V2 Router Authentication Bypass via Serial Number | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T14:22:32.238Z
Reserved: 2026-05-13T13:49:58.352Z
Link: CVE-2020-37220
No data.
Status : Deferred
Published: 2026-05-13T16:16:33.423
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37220
No data.
OpenCVE Enrichment
Updated: 2026-05-13T17:15:26Z