Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9644: CWE-489 Active Debug Code in Four-Faith F3x36

0
Critical
VulnerabilityCVE-2024-9644cvecve-2024-9644cwe-489cwe-306
Published: Tue Feb 04 2025 (02/04/2025, 14:58:03 UTC)
Source: CVE Database V5
Vendor/Project: Four-Faith
Product: F3x36

Description

The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:43:48 UTC

Technical Analysis

CVE-2024-9644 is a critical security vulnerability identified in the Four-Faith F3x36 router running firmware version 2.0.0. The vulnerability stems from an authentication bypass flaw in the router's administrative web server. Specifically, while the standard administrative endpoint "apply.cgi" enforces authentication, an alternative endpoint "bapply.cgi" does not. This discrepancy allows remote attackers to access administrative functions without any authentication. The vulnerability is categorized under CWE-489 (Active Debug Code) and CWE-306 (Missing Authentication for Critical Function). An attacker exploiting this flaw can remotely modify router configurations, potentially altering network settings, disabling security controls, or redirecting traffic. Given the router’s role in network infrastructure, such unauthorized modifications can lead to severe confidentiality breaches, integrity violations, and availability disruptions. The CVSS v3.1 score of 9.8 reflects the vulnerability’s critical nature, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the presence of an unauthenticated access vector makes this vulnerability highly exploitable. The lack of available patches at the time of disclosure further increases the risk. Organizations relying on Four-Faith F3x36 routers should consider immediate risk assessments and implement compensating controls to mitigate potential exploitation.

Potential Impact

For European organizations, the impact of CVE-2024-9644 can be substantial. The Four-Faith F3x36 router is typically deployed in industrial, utility, or specialized network environments where secure and reliable connectivity is critical. An attacker exploiting this vulnerability could gain unauthorized administrative access, leading to manipulation of network configurations, interception or redirection of sensitive data, and potential disruption of network services. This could affect confidentiality by exposing sensitive communications, integrity by altering routing or firewall rules, and availability by causing denial of service or network outages. Critical infrastructure sectors such as energy, manufacturing, and telecommunications in Europe could face operational disruptions or data breaches. Additionally, the ability to chain this vulnerability with other authenticated exploits increases the risk of persistent compromise and lateral movement within networks. The absence of authentication enforcement on a critical administrative interface represents a severe security gap that could be leveraged for espionage, sabotage, or ransomware deployment.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include restricting network access to the router’s administrative interfaces by applying strict firewall rules and network segmentation to limit exposure to trusted management networks only. Monitoring and logging all administrative access attempts to detect anomalous or unauthorized activity is essential. Organizations should disable or block access to the "bapply.cgi" endpoint if possible, or employ web application firewalls (WAFs) to detect and block requests targeting this endpoint. Regularly updating router firmware when patches become available is critical. Additionally, organizations should conduct thorough audits of router configurations to identify unauthorized changes and implement multi-factor authentication on all management interfaces where supported. Incident response plans should be updated to include this vulnerability, and staff should be trained to recognize signs of exploitation. Finally, consider replacing vulnerable devices with models from vendors with stronger security track records if mitigation is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2024-10-08T18:08:01.273Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e29f04d0ffcb40bb6a612

Added to database: 11/19/2025, 8:34:56 PM

Last enriched: 11/19/2025, 8:43:48 PM

Last updated: 11/20/2025, 4:20:19 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats