Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63353: n/a

0
Critical
VulnerabilityCVE-2025-63353cvecve-2025-63353
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:59:55 UTC

Technical Analysis

CVE-2025-63353 identifies a critical security vulnerability in the FiberHome GPON ONU HG6145F1 RP4423 model, where the factory default Wi-Fi password (WPA/WPA2 pre-shared key) is generated using a deterministic algorithm derived from the device's SSID. This design flaw means that an attacker who can observe the SSID broadcast by the device can predict the default Wi-Fi password without needing any authentication or user interaction. The vulnerability arises from improper credential management (CWE-284), where the default credentials are not randomized or unique per device but instead algorithmically linked to the SSID. This allows for straightforward offline password prediction attacks, enabling unauthorized network access. Once connected, an attacker could intercept sensitive data, manipulate network traffic, or disrupt network availability. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical impact on confidentiality, integrity, and availability, with no privileges or user interaction required and network attack vector. No patches or firmware updates have been published yet, and no active exploitation has been reported. The affected device is commonly deployed in fiber-optic broadband networks, particularly in regions where FiberHome equipment is widely used.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for ISPs, enterprises, and residential users relying on FiberHome GPON ONU HG6145F1 RP4423 devices. Unauthorized access to Wi-Fi networks can lead to data breaches, interception of sensitive communications, lateral movement within internal networks, and potential disruption of services. Critical infrastructure sectors using these devices for broadband connectivity could face operational disruptions or espionage risks. The ease of exploitation—requiring only observation of the SSID—means attackers can quickly compromise networks without physical access or complex attack vectors. This could undermine trust in service providers and lead to regulatory penalties under GDPR if personal data is exposed. The lack of available patches increases the urgency for organizations to implement compensating controls to protect their networks.

Mitigation Recommendations

1. Immediately audit networks to identify FiberHome GPON ONU HG6145F1 RP4423 devices and assess exposure. 2. Where possible, replace vulnerable devices with models that do not use deterministic default passwords or that support secure credential management. 3. Disable or change default Wi-Fi credentials manually to strong, unique passwords that are not derivable from the SSID. 4. Implement network segmentation to isolate vulnerable devices from critical internal systems and sensitive data. 5. Use strong encryption and VPNs for sensitive communications over Wi-Fi networks. 6. Monitor network traffic for unauthorized access attempts or unusual activity originating from Wi-Fi connections. 7. Engage with ISPs and FiberHome vendors to demand firmware updates or patches addressing this vulnerability. 8. Educate users and administrators about the risks of default credentials and the importance of changing them. 9. Apply strict access control policies and consider disabling Wi-Fi SSID broadcast if feasible to reduce exposure. 10. Maintain up-to-date asset inventories and vulnerability management processes to quickly respond to emerging threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6914b35c224357dd22fa7e39

Added to database: 11/12/2025, 4:18:36 PM

Last enriched: 11/19/2025, 4:59:55 PM

Last updated: 11/22/2025, 2:07:58 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats