PT-2024-10029 · Four Faith · Four-Faith F3X36 +1

Junior_Baines

·

Published

2024-12-20

·

Updated

2025-11-11

·

CVE-2024-12856

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Four-Faith routers F3x24 and F3x36 versions prior to 2.0
Description The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via the
apply.cgi
endpoint. The firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue. This vulnerability, tracked as CVE-2024-12856, has a CVSS score of 7.2 and is being actively exploited in the wild. Attackers are leveraging the default credentials to execute commands remotely via the
adj time year
parameter, establishing reverse shells for persistent access. Reports indicate over 15,000 devices are potentially exposed. The vulnerability allows attackers to inject commands through a specially crafted POST request to the
/apply.cgi
API endpoint. The
adj time year
parameter within this request is used to embed malicious commands.
Recommendations For Four-Faith routers F3x24 and F3x36 versions prior to 2.0, update the firmware to a newer, secure version if available. Change the default credentials immediately to prevent unauthenticated access. As a temporary workaround, restrict access to the
apply.cgi
endpoint. Consider disabling remote administration access if not required.

Exploit

Fix

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2025-00162
CVE-2024-12856

Affected Products

Four-Faith F3X24
Four-Faith F3X36