PT-2024-10029 · Four Faith · Four-Faith F3X36 +1
Junior_Baines
·
Published
2024-12-20
·
Updated
2025-11-11
·
CVE-2024-12856
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Four-Faith routers F3x24 and F3x36
versions prior to 2.0
Description
The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via the
apply.cgi endpoint. The firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue. This vulnerability, tracked as CVE-2024-12856, has a CVSS score of 7.2 and is being actively exploited in the wild. Attackers are leveraging the default credentials to execute commands remotely via the adj time year parameter, establishing reverse shells for persistent access. Reports indicate over 15,000 devices are potentially exposed. The vulnerability allows attackers to inject commands through a specially crafted POST request to the /apply.cgi API endpoint. The adj time year parameter within this request is used to embed malicious commands.Recommendations
For Four-Faith routers F3x24 and F3x36 versions prior to 2.0, update the firmware to a newer, secure version if available.
Change the default credentials immediately to prevent unauthenticated access.
As a temporary workaround, restrict access to the
apply.cgi endpoint.
Consider disabling remote administration access if not required.Exploit
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-00162
CVE-2024-12856
Affected Products
Four-Faith F3X24
Four-Faith F3X36
References · 90
- 🔥 https://vulncheck.com/blog/four-faith-cve-2024-12856 · Exploit
- 🔥 https://ducklingstudio.blog.fc2.com/blog-entry-392.html · Exploit
- https://bdu.fstec.ru/vul/2025-00162 · Security Note
- https://safe-surf.ru/upload/VULN-new/VULN.2025-01-10.1.pdf · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2024-12856 · Security Note
- https://twitter.com/transilienceai/status/1941000250241552528 · Twitter Post
- https://twitter.com/threatsbank/status/1941505093943083163 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1872810486103753029 · Twitter Post
- https://twitter.com/arunpratap786/status/1874937648131018770 · Twitter Post
- https://twitter.com/transilienceai/status/1887112802671702363 · Twitter Post
- https://twitter.com/TMJIntel/status/1873737303954264291 · Twitter Post
- https://twitter.com/SedimentIV/status/1876735947577971046 · Twitter Post
- https://twitter.com/arunpratap786/status/1874937705915978075 · Twitter Post
- https://twitter.com/cyfirma/status/1944627837719421318 · Twitter Post
- https://twitter.com/CyberxtronTech/status/1873612708228039126 · Twitter Post