Huawei Firmware Download

0 views
Skip to first unread message
Message has been deleted

Elbio Gottlieb

unread,
Jul 16, 2024, 8:50:19 PM7/16/24
to liradenlo

After registering for an account, it will ask you to verify your email if you signed up with email. After that, it will tell you that you need to provide more information in order to get the documentation you need.

A quick look through the official site -servers/rh5885h-v3-pid-9768163/software/ shows a bunch of downloadable packages with firmware and related documents. Have you tried downloading and running them? Where are you stuck?

huawei firmware download


Download File >>>>> https://urlin.us/2yRQfs



I agree with the previous answers. I think you can find the firmware you need and the installation guide on the official website -v3-pid-9768163/software/ .
Could you clarify what kind of difficulties you are currently experiencing?

this hidden network appeared recently to me, i can't tell exactly the time, but i'm sure that it wasn't there when i first bought the router, i'm suspecting that this wifi appeared when i updated to the firmware v10.0.5.33 (i have the ax3 quad core global), i contacted huawei support trought e-mail but i haven't got a awnser yet, if you could reset the router to test if the hidden wifi will disappear that would help, i can't do because my network will get disconnected and i would have to contact the ISP

i have the ax3 pro global version, and my router also doesn't downgrade using the normal global firmware, i found this one (link below) that it gets flashed, but i haven't found any differences between this and the most updated
here is the link: -20_10.0.5.26_main_debug.zip/file

But what I am trying to install in the Brazilian router (WS7200-30) is the Chinese firmware, not the global one, because I want to be able to keep using the additional amplifiers that this hardware has. I would like to flash the Chinese version because I have another router which is actually a Chinese version (WS7200-10) and I want to make them work in a mesh setup.

I wouldn't get your hopes up about OpenWrt support on this model for a long while (if ever), between the device probably being locked down, ipq50xx not being a supported target yet, and the nand flash on the new model probably needing a new driver. (DS32M1GA, however the datasheet is available...)

Hello everyone, I have 3 units of the Huawei AX3 Pro with firmware 10.0.5.33 - one of the unit managed to detect the new firmware version 10.0.5.36 and upgraded successfully. However the other two units don't seems to be able to find the update

After trying to install Linux Mint on a USB flash drive (the same one upon which the Live USB had been set up), I have two entries listed in the UEFI setup program for the same hard drive (even after unplugging the flash drive) as shown in this screenshot.

I think this was caused by the fact that I disabled the hard drive from the setup program before installing Mint, as I wanted to ensure that the only hard drive visible would be the USB stick (after booting to RAM and repartitioning the stick). But this landed me in "OEM Configuration Mode" where the hard drive was still visible.

As such, I'm looking for a way to remove the erroneous drive entry. A non-destructive method would be best, but if I had to completely reflash the UEFI firmware that would also be acceptable (as long as it doesn't touch the hard drive). MTIA! :-)

Update: The photo link provided above shows two bootable drives, both named the same, but one of them is my USB stick...I think. It doesn't show up as "SanDisk Cruzer Switch" anymore whereas I previously had that and the two Samsung drive entries (but only 1 actual Samsung drive). Booting Mint still works so I guess my UEFI firmware now thinks that the Cruzer Switch is a Samsung SSD! Weird!

After many unsuccessful tests I stood on number 2 and noticed F5/F6 Change values. I press F5 and number 2 swapped positions with number 1 and now MateBook Pro starts normally with Windows 10 but when I want boot Linux I press F12 go to the lower disk (USB connected) and Elementary OS starts.

I'm a massive fan of GG and use it regularly on my rooted HTC U11. I recently bought a new Huawei MediaPad M5 (the 8.4" version) and was pleased to see that root is now no longer a requirement for GG - I'm quite nervous about rooting the new pad, as it breaks Widevine level 1 support. I set about downloading Parallel Space and began hacking away at Crashlands, conveniently sync'ing my gamesave from cloud storage into my Parallel Space.

Alas, I came upon the problem whereby I can attach to the Crashlands process, search and iterate to find addresses but I cannot edit or freeze values. Logcat shows errors when invoking the ptrace system call.

I've come across a few posts here that describe similar observations with Huawei devices and a few responses from the GG author that it looks like a firmware / core issue with the Huawei implementation of the ptrace system call.

I wondered what it would take to address this issue with my device and others? Could this be something that's fixed with an Xposed or Magisk module? Or is it a deliberate security measure / bug in the firmware that's just too deeply buried to do anything about?

Yeah, recently got the Mediapad M5. Although the 10" model. Was hard to root, but managed it nonetheless. Still have the same game guardian problem. Although I don't know whether flashing a new kernel like Serenity would help. Any other possible solutions? Flashing stock android or something?

Alright people. Just found this out today and tested it on my Huawei Mate SE/Honor 7x. Game Guardian doesn't work on Android Oreo because of the ptrace issue. In order to fix this, you must downgrade to Nougat and GG will work PERFECTLY. I'm afraid you'll have to break widevine level 1 support though, @mroshaw. Hope this helps!

Has anyone had success with the Huawei E3372 LTE modems. We could get it to work in HiLink DHCP mode, but we need the modem to present the WAN IP address directly to the XG interface. HiLink mode uses NAT, so we have managed to Re-Flash the modem with firmware to convert it to Stick (Serial) Mode.

Our XG is detecting the modem's COM ports and attempts to connect, but just sits on connecting forever. We have the correct APN for telstra.extranet which provides us with a static IP address and the correct phone number of *99#

Configure the connection and if it works then you know you are looking at an issue with SFOS otherwise you might have the wrong firmware for your device (remember firmware is region specific, although some/most will work globally)

Finite State has released a security report that used binary analysis to reveal a litany of flaws in Huawei firmware. Huawei has refuted some points of the report, with Finite State standing by their analysis. The analysis covered 9,936 firmware images across 558 devices over a period of 18 months with similar analysis of market competitors to act as a control.

The reported issues included practices such as replacing memcpy_s with a wrapper around the basic memcpy, which removes the buffer overflow protection. By contrast, Microsoft banned usage of memcpy in its 2009 push for secure computing. Finite State's report validates Huawei's removal of the correct function through the application binary: "VOS_memcpy_s appears to be a custom implementation for memcpy_s. However it calls memcpy without any parameter validation." Within the firmware, other defenses against memory issues were often missing. Many developers utilize Address Space Layout Randomization (ASLR) to complicate memory attacks by making memory targets unpredictable. Analysis revealed that only approximately one third of Huawei firmware utilized this security control. Other types of issues were memory corruption flaws, default credentials, hardcoded public encryption keys for control, and use of insecure outdated components. Encryption keys included entries in the SSH authorized_keys file, a feature that facilitates remote access.

The engine used for analysis was a binary analyzer that includes over 45 integrated tools to unpack and analyze device firmware. Common public tools used in the Finite State analysis include NSA Ghidra, Binary Ninja, and Radare2. InfoQ discussed the type of analysis with Dennis Andriesse, author of Practical Binary Analysis, whose work appears inside Binary Ninja.

There's been a lot of research on binary analysis techniques ranging from automatic detection of buffer overflows and format string vulnerabilities, to automatic exploit generation for suspected vulnerabilities. Many techniques have matured a lot and are seeing increasingly wide use both in industry and in the hacking community. For example, many companies now use fuzzing to catch bugs before they release their software.

The report includes side-by-side security analysis of similar products: Huawei CE12800, Juniper EX4650, and Arista 7820R. InfoQ spoke with Mandy Sadowski, VP of marketing at Finite State, to establish why the other devices were selected. "We considered the use case for the Huawei CE12800, Arista 7280R, and Juniper EX4650 to overlap and based our case study on these three similar products." Firmware images were current at time of analysis. Huawei firmware was the only device with hardcoded credentials and cryptography keys, and had the highest number of memory corruption issues. In the hardcoded credentials, the password hashes were the same between users: root, huawei, and python.

Huawei published a statement refuting some findings from the Finite State report but did not address the findings from HCSEC. The rebuttal includes a technical response from their Product Security Incident Response Team (PSIRT). The rebuttal cites issues such as not including major market competitor Cisco in the comparable list and that some of the firmware analyzed by Finite State was outdated. It also indicates that the hardcoded SSH encryption keys are commonly removed following installation. Huawei also indicated that the binary analysis tool used by Finite State "would not identify significant vulnerabilities in Huawei's gear."

Phone number has been with Fido for at least two years, and was working fine with Wifi Calling when I enabled it two months ago. It only stopped working at about the same time I upgraded the phone firmware to build 156, about a week or two ago.

59fb9ae87f
Reply all
Reply to author
Forward
0 new messages