Vulnerability Description
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Four-Faith | F3X36 Firmware | 2.0 |
| Four-Faith | F3X36 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752Not Applicable
- https://vulncheck.com/advisories/four-faith-hard-coded-credsThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752Not Applicable
FAQ
What is CVE-2024-9643?
CVE-2024-9643 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials c...
How severe is CVE-2024-9643?
CVE-2024-9643 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-9643?
Check the references section above for vendor advisories and patch information. Affected products include: Four-Faith F3X36 Firmware, Four-Faith F3X36.