cve/2024/CVE-2024-9643.md
2025-09-29 21:09:30 +02:00

19 lines
958 B
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-9643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9643)
![](https://img.shields.io/static/v1?label=Product&message=F3x36&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-489%20Active%20Debug%20Code&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Use%20of%20Hard-coded%20Credentials&color=brightgreen)
### Description
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752
#### Github
No PoCs found on GitHub currently.