CVE-2024-9643: CWE-489 Active Debug Code in Four-Faith F3x36
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
AI Analysis
Technical Summary
CVE-2024-9643 identifies a critical security vulnerability in the Four-Faith F3x36 router running firmware version 2.0.0. The root cause is the presence of hard-coded credentials within the administrative web server component, classified under CWE-489 (Active Debug Code) and CWE-798 (Use of Hard-coded Credentials). These credentials allow an attacker to bypass authentication mechanisms entirely by crafting specific HTTP requests to the device's management interface. This bypass grants full administrative privileges, enabling attackers to manipulate router configurations, intercept or redirect network traffic, deploy further malware, or disrupt network availability. The vulnerability is remotely exploitable without any authentication or user interaction, as reflected by the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N). The critical CVSS score of 9.8 highlights the severe impact on confidentiality, integrity, and availability. While no public exploits are currently known, the similarity to a previous vulnerability (CVE-2023-32645) indicates that exploitation techniques may be easily adapted or developed. The lack of available patches or firmware updates from Four-Faith at the time of publication increases the urgency for organizations to implement compensating controls. This vulnerability is particularly concerning for environments where Four-Faith routers are deployed in industrial control systems, critical infrastructure, or enterprise networks, as attackers gaining administrative access could cause significant operational and security damage.
Potential Impact
For European organizations, the impact of CVE-2024-9643 is substantial. Unauthorized administrative access to Four-Faith F3x36 routers can lead to complete compromise of network infrastructure, enabling attackers to intercept sensitive communications, alter routing policies, or launch further attacks within the network. This threatens the confidentiality of data, the integrity of network configurations, and the availability of critical services. Industrial and critical infrastructure sectors using these routers may face operational disruptions, safety risks, and regulatory compliance violations. The vulnerability's remote exploitability without authentication increases the attack surface, especially for devices exposed to untrusted networks or insufficiently segmented environments. Given the lack of patches, organizations may experience prolonged exposure, increasing the risk of targeted attacks or automated exploitation campaigns. The potential for lateral movement and persistent access within networks further exacerbates the threat to European enterprises and public sector entities relying on Four-Faith equipment.
Mitigation Recommendations
1. Immediately isolate Four-Faith F3x36 routers running firmware v2.0.0 from untrusted networks, especially the internet. 2. Restrict access to the administrative web interface using network segmentation, firewall rules, or VPNs limited to trusted personnel. 3. Monitor network traffic for unusual HTTP requests targeting the router's management interface and implement intrusion detection signatures where possible. 4. Disable or restrict remote management features if not essential. 5. Engage with Four-Faith support channels to obtain firmware updates or patches as they become available. 6. Consider replacing affected devices with alternative hardware from vendors with stronger security postures if patching is delayed. 7. Conduct thorough audits of network devices to identify any unauthorized configuration changes or signs of compromise. 8. Implement multi-factor authentication and strong credential management on all network devices to reduce risk from similar vulnerabilities. 9. Maintain up-to-date asset inventories to quickly identify affected devices across the organization. 10. Educate network administrators about this vulnerability and the importance of securing device management interfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-9643: CWE-489 Active Debug Code in Four-Faith F3x36
Description
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
AI-Powered Analysis
Technical Analysis
CVE-2024-9643 identifies a critical security vulnerability in the Four-Faith F3x36 router running firmware version 2.0.0. The root cause is the presence of hard-coded credentials within the administrative web server component, classified under CWE-489 (Active Debug Code) and CWE-798 (Use of Hard-coded Credentials). These credentials allow an attacker to bypass authentication mechanisms entirely by crafting specific HTTP requests to the device's management interface. This bypass grants full administrative privileges, enabling attackers to manipulate router configurations, intercept or redirect network traffic, deploy further malware, or disrupt network availability. The vulnerability is remotely exploitable without any authentication or user interaction, as reflected by the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N). The critical CVSS score of 9.8 highlights the severe impact on confidentiality, integrity, and availability. While no public exploits are currently known, the similarity to a previous vulnerability (CVE-2023-32645) indicates that exploitation techniques may be easily adapted or developed. The lack of available patches or firmware updates from Four-Faith at the time of publication increases the urgency for organizations to implement compensating controls. This vulnerability is particularly concerning for environments where Four-Faith routers are deployed in industrial control systems, critical infrastructure, or enterprise networks, as attackers gaining administrative access could cause significant operational and security damage.
Potential Impact
For European organizations, the impact of CVE-2024-9643 is substantial. Unauthorized administrative access to Four-Faith F3x36 routers can lead to complete compromise of network infrastructure, enabling attackers to intercept sensitive communications, alter routing policies, or launch further attacks within the network. This threatens the confidentiality of data, the integrity of network configurations, and the availability of critical services. Industrial and critical infrastructure sectors using these routers may face operational disruptions, safety risks, and regulatory compliance violations. The vulnerability's remote exploitability without authentication increases the attack surface, especially for devices exposed to untrusted networks or insufficiently segmented environments. Given the lack of patches, organizations may experience prolonged exposure, increasing the risk of targeted attacks or automated exploitation campaigns. The potential for lateral movement and persistent access within networks further exacerbates the threat to European enterprises and public sector entities relying on Four-Faith equipment.
Mitigation Recommendations
1. Immediately isolate Four-Faith F3x36 routers running firmware v2.0.0 from untrusted networks, especially the internet. 2. Restrict access to the administrative web interface using network segmentation, firewall rules, or VPNs limited to trusted personnel. 3. Monitor network traffic for unusual HTTP requests targeting the router's management interface and implement intrusion detection signatures where possible. 4. Disable or restrict remote management features if not essential. 5. Engage with Four-Faith support channels to obtain firmware updates or patches as they become available. 6. Consider replacing affected devices with alternative hardware from vendors with stronger security postures if patching is delayed. 7. Conduct thorough audits of network devices to identify any unauthorized configuration changes or signs of compromise. 8. Implement multi-factor authentication and strong credential management on all network devices to reduce risk from similar vulnerabilities. 9. Maintain up-to-date asset inventories to quickly identify affected devices across the organization. 10. Educate network administrators about this vulnerability and the importance of securing device management interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2024-10-08T18:08:00.149Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692136eec842cd8eff5f2700
Added to database: 11/22/2025, 4:07:10 AM
Last enriched: 11/22/2025, 4:07:25 AM
Last updated: 11/22/2025, 10:14:32 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
CriticalCVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.