Vulnerabilites related to four-faith - f3x36_firmware
CVE-2024-9644 (GCVE-0-2024-9644)
Vulnerability from cvelistv5
Published
2025-02-04 14:58
Modified
2025-02-04 15:49
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an
authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://vulncheck.com/advisories/four-faith-hidden-api | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Four-Faith | F3x36 |
Version: 2.0.0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9644", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T15:48:55.611580Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T15:49:20.305Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "F3x36", "vendor": "Four-Faith", "versions": [ { "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jacob Baines" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an \nauthentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the \"bapply.cgi\" endpoint instead of the normal \"apply.cgi\" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.\u003cbr\u003e" } ], "value": "The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an \nauthentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the \"bapply.cgi\" endpoint instead of the normal \"apply.cgi\" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-489", "description": "CWE-489 Active Debug Code", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:58:03.363Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/four-faith-hidden-api" } ], "source": { "discovery": "EXTERNAL" }, "title": "Four-Faith F3x36 bapply.cgi Auth Bypass", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-9644", "datePublished": "2025-02-04T14:58:03.363Z", "dateReserved": "2024-10-08T18:08:01.273Z", "dateUpdated": "2025-02-04T15:49:20.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-12856 (GCVE-0-2024-12856)
Vulnerability from cvelistv5
Published
2024-12-27 16:03
Modified
2025-09-25 18:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
References
▼ | URL | Tags |
---|---|---|
https://vulncheck.com/blog/four-faith-cve-2024-12856 | exploit, technical-description | |
https://vulncheck.com/advisories/four-faith-time | third-party-advisory | |
https://ducklingstudio.blog.fc2.com/blog-entry-392.html | exploit |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Four-Faith | F3x24 |
Version: 2.0 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12856", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:24:33.511503Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:24:42.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://vulncheck.com/blog/four-faith-cve-2024-12856" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "F3x24", "vendor": "Four-Faith", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "defaultStatus": "unknown", "product": "F3x36", "vendor": "Four-Faith", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.\u003cbr\u003e" } ], "value": "The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1392", "description": "CWE-1392 Use of Default Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-25T18:24:28.510Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "exploit", "technical-description" ], "url": "https://vulncheck.com/blog/four-faith-cve-2024-12856" }, { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/four-faith-time" }, { "tags": [ "exploit" ], "url": "https://ducklingstudio.blog.fc2.com/blog-entry-392.html" } ], "source": { "discovery": "EXTERNAL" }, "tags": [ "x_known-exploited-vulnerability" ], "title": "Four-Faith Industrial Router adjust_sys_time OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-12856", "datePublished": "2024-12-27T16:03:04.567Z", "dateReserved": "2024-12-20T16:13:34.537Z", "dateUpdated": "2025-09-25T18:24:28.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9643 (GCVE-0-2024-9643)
Vulnerability from cvelistv5
Published
2025-02-04 14:47
Modified
2025-02-04 15:51
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
References
▼ | URL | Tags |
---|---|---|
https://vulncheck.com/advisories/four-faith-hard-coded-creds | third-party-advisory | |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752 | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Four-Faith | F3x36 |
Version: 2.0.0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9643", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T15:51:11.212644Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T15:51:15.735Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "F3x36", "vendor": "Four-Faith", "versions": [ { "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jacob Baines" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Four-Faith\u0026nbsp;F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.\u003cbr\u003e" } ], "value": "The Four-Faith\u00a0F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645." } ], "impacts": [ { "capecId": "CAPEC-70", "descriptions": [ { "lang": "en", "value": "CAPEC-70 Try Common or Default Usernames and Passwords" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-489", "description": "CWE-489 Active Debug Code", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:47:40.214Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/four-faith-hard-coded-creds" }, { "tags": [ "third-party-advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752" } ], "source": { "discovery": "UNKNOWN" }, "title": "Four-Faith F3x36 Hidden Debug Credentials", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-9643", "datePublished": "2025-02-04T14:47:40.214Z", "dateReserved": "2024-10-08T18:08:00.149Z", "dateUpdated": "2025-02-04T15:51:15.735Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2025-02-04 15:15
Modified
2025-09-19 19:33
Severity ?
Summary
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
four-faith | f3x36_firmware | 2.0 | |
four-faith | f3x36 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:four-faith:f3x36_firmware:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4465943D-58C8-41A3-BA22-6A83B5D3FDCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:four-faith:f3x36:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FFCC6F9-6DE1-4415-B0C5-729190BD0562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Four-Faith\u00a0F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645." }, { "lang": "es", "value": "Four-Faith F3x36 router que utiliza el firmware v2.0.0 es vulnerable a la omisi\u00f3n de autenticaci\u00f3n debido a credenciales codificadas de forma r\u00edgida en el servidor web administrativo. Un atacante con conocimiento de las credenciales puede obtener acceso administrativo a trav\u00e9s de solicitudes HTTP manipulado. Este problema parece similar a CVE-2023-32645." } ], "id": "CVE-2024-9643", "lastModified": "2025-09-19T19:33:43.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }, "published": "2025-02-04T15:15:19.120", "references": [ { "source": "disclosure@vulncheck.com", "tags": [ "Not Applicable" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752" }, { "source": "disclosure@vulncheck.com", "tags": [ "Third Party Advisory" ], "url": "https://vulncheck.com/advisories/four-faith-hard-coded-creds" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Not Applicable" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752" } ], "sourceIdentifier": "disclosure@vulncheck.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-489" }, { "lang": "en", "value": "CWE-798" } ], "source": "disclosure@vulncheck.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-12-27 16:15
Modified
2025-09-25 19:15
Severity ?
Summary
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
References
▼ | URL | Tags | |
---|---|---|---|
disclosure@vulncheck.com | https://ducklingstudio.blog.fc2.com/blog-entry-392.html | Exploit, Third Party Advisory | |
disclosure@vulncheck.com | https://vulncheck.com/advisories/four-faith-time | Third Party Advisory | |
disclosure@vulncheck.com | https://vulncheck.com/blog/four-faith-cve-2024-12856 | Exploit, Third Party Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://vulncheck.com/blog/four-faith-cve-2024-12856 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
four-faith | f3x36_firmware | 2.0 | |
four-faith | f3x36 | - | |
four-faith | f3x24_firmware | 2.0 | |
four-faith | f3x24 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:four-faith:f3x36_firmware:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4465943D-58C8-41A3-BA22-6A83B5D3FDCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:four-faith:f3x36:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FFCC6F9-6DE1-4415-B0C5-729190BD0562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:four-faith:f3x24_firmware:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BADB61C5-923D-473E-B7C6-0DF565A263DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:four-faith:f3x24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4E32C01-5977-4E5F-89B6-A349F1125322", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue." }, { "lang": "es", "value": "Los modelos del router Four-Faith F3x24 y F3x36 se ven afectados por una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo (OS). Al menos la versi\u00f3n de firmware 2.0 permite a los atacantes autenticados y remotos ejecutar comandos arbitrarios del SO a trav\u00e9s de HTTP al modificar la hora del sistema mediante apply.cgi. Adem\u00e1s, esta versi\u00f3n de firmware tiene credenciales predeterminadas que, si no se modifican, convertir\u00edan efectivamente esta vulnerabilidad en un problema de ejecuci\u00f3n de comandos del SO no autenticados y remotos." } ], "id": "CVE-2024-12856", "lastModified": "2025-09-25T19:15:41.487", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }, "published": "2024-12-27T16:15:23.403", "references": [ { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://ducklingstudio.blog.fc2.com/blog-entry-392.html" }, { "source": "disclosure@vulncheck.com", "tags": [ "Third Party Advisory" ], "url": "https://vulncheck.com/advisories/four-faith-time" }, { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vulncheck.com/blog/four-faith-cve-2024-12856" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vulncheck.com/blog/four-faith-cve-2024-12856" } ], "sourceIdentifier": "disclosure@vulncheck.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" }, { "lang": "en", "value": "CWE-1392" } ], "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-02-04 15:15
Modified
2025-09-19 19:12
Severity ?
Summary
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an
authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
References
▼ | URL | Tags | |
---|---|---|---|
disclosure@vulncheck.com | https://vulncheck.com/advisories/four-faith-hidden-api | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
four-faith | f3x36_firmware | 2.0 | |
four-faith | f3x36 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:four-faith:f3x36_firmware:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4465943D-58C8-41A3-BA22-6A83B5D3FDCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:four-faith:f3x36:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FFCC6F9-6DE1-4415-B0C5-729190BD0562", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an \nauthentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the \"bapply.cgi\" endpoint instead of the normal \"apply.cgi\" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities." }, { "lang": "es", "value": "Four-Faith F3x36 router que utiliza el firmware v2.0.0 es vulnerable a una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en el servidor web administrativo. La autenticaci\u00f3n no se aplica en algunas funciones administrativas cuando se utiliza \"bapply.cgi\" endpoint en lugar del \"apply.cgiendpointnt normal. Un usuario remoto y no autenticado puede utilizar esta vulnerabilidad para modificar la configuraci\u00f3n o encadenarla con vulnerabilidades autenticadas existentes." } ], "id": "CVE-2024-9644", "lastModified": "2025-09-19T19:12:31.487", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }, "published": "2025-02-04T15:15:19.273", "references": [ { "source": "disclosure@vulncheck.com", "tags": [ "Third Party Advisory" ], "url": "https://vulncheck.com/advisories/four-faith-hidden-api" } ], "sourceIdentifier": "disclosure@vulncheck.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" }, { "lang": "en", "value": "CWE-489" } ], "source": "disclosure@vulncheck.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }