CVE-2025-63353: n/a
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
AI Analysis
Technical Summary
CVE-2025-63353 identifies a critical security vulnerability in the FiberHome GPON ONU HG6145F1 RP4423 model, where the factory default Wi-Fi password (WPA/WPA2 pre-shared key) is generated using a deterministic algorithm derived from the device's SSID. This design flaw means that an attacker who can observe the SSID broadcast by the device can predict the default Wi-Fi password without needing any authentication or user interaction. The vulnerability arises from improper credential management (CWE-284), where the default credentials are not randomized or unique per device but instead algorithmically linked to the SSID. This allows for straightforward offline password prediction attacks, enabling unauthorized network access. Once connected, an attacker could intercept sensitive data, manipulate network traffic, or disrupt network availability. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical impact on confidentiality, integrity, and availability, with no privileges or user interaction required and network attack vector. No patches or firmware updates have been published yet, and no active exploitation has been reported. The affected device is commonly deployed in fiber-optic broadband networks, particularly in regions where FiberHome equipment is widely used.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for ISPs, enterprises, and residential users relying on FiberHome GPON ONU HG6145F1 RP4423 devices. Unauthorized access to Wi-Fi networks can lead to data breaches, interception of sensitive communications, lateral movement within internal networks, and potential disruption of services. Critical infrastructure sectors using these devices for broadband connectivity could face operational disruptions or espionage risks. The ease of exploitation—requiring only observation of the SSID—means attackers can quickly compromise networks without physical access or complex attack vectors. This could undermine trust in service providers and lead to regulatory penalties under GDPR if personal data is exposed. The lack of available patches increases the urgency for organizations to implement compensating controls to protect their networks.
Mitigation Recommendations
1. Immediately audit networks to identify FiberHome GPON ONU HG6145F1 RP4423 devices and assess exposure. 2. Where possible, replace vulnerable devices with models that do not use deterministic default passwords or that support secure credential management. 3. Disable or change default Wi-Fi credentials manually to strong, unique passwords that are not derivable from the SSID. 4. Implement network segmentation to isolate vulnerable devices from critical internal systems and sensitive data. 5. Use strong encryption and VPNs for sensitive communications over Wi-Fi networks. 6. Monitor network traffic for unauthorized access attempts or unusual activity originating from Wi-Fi connections. 7. Engage with ISPs and FiberHome vendors to demand firmware updates or patches addressing this vulnerability. 8. Educate users and administrators about the risks of default credentials and the importance of changing them. 9. Apply strict access control policies and consider disabling Wi-Fi SSID broadcast if feasible to reduce exposure. 10. Maintain up-to-date asset inventories and vulnerability management processes to quickly respond to emerging threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-63353: n/a
Description
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
AI-Powered Analysis
Technical Analysis
CVE-2025-63353 identifies a critical security vulnerability in the FiberHome GPON ONU HG6145F1 RP4423 model, where the factory default Wi-Fi password (WPA/WPA2 pre-shared key) is generated using a deterministic algorithm derived from the device's SSID. This design flaw means that an attacker who can observe the SSID broadcast by the device can predict the default Wi-Fi password without needing any authentication or user interaction. The vulnerability arises from improper credential management (CWE-284), where the default credentials are not randomized or unique per device but instead algorithmically linked to the SSID. This allows for straightforward offline password prediction attacks, enabling unauthorized network access. Once connected, an attacker could intercept sensitive data, manipulate network traffic, or disrupt network availability. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical impact on confidentiality, integrity, and availability, with no privileges or user interaction required and network attack vector. No patches or firmware updates have been published yet, and no active exploitation has been reported. The affected device is commonly deployed in fiber-optic broadband networks, particularly in regions where FiberHome equipment is widely used.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for ISPs, enterprises, and residential users relying on FiberHome GPON ONU HG6145F1 RP4423 devices. Unauthorized access to Wi-Fi networks can lead to data breaches, interception of sensitive communications, lateral movement within internal networks, and potential disruption of services. Critical infrastructure sectors using these devices for broadband connectivity could face operational disruptions or espionage risks. The ease of exploitation—requiring only observation of the SSID—means attackers can quickly compromise networks without physical access or complex attack vectors. This could undermine trust in service providers and lead to regulatory penalties under GDPR if personal data is exposed. The lack of available patches increases the urgency for organizations to implement compensating controls to protect their networks.
Mitigation Recommendations
1. Immediately audit networks to identify FiberHome GPON ONU HG6145F1 RP4423 devices and assess exposure. 2. Where possible, replace vulnerable devices with models that do not use deterministic default passwords or that support secure credential management. 3. Disable or change default Wi-Fi credentials manually to strong, unique passwords that are not derivable from the SSID. 4. Implement network segmentation to isolate vulnerable devices from critical internal systems and sensitive data. 5. Use strong encryption and VPNs for sensitive communications over Wi-Fi networks. 6. Monitor network traffic for unauthorized access attempts or unusual activity originating from Wi-Fi connections. 7. Engage with ISPs and FiberHome vendors to demand firmware updates or patches addressing this vulnerability. 8. Educate users and administrators about the risks of default credentials and the importance of changing them. 9. Apply strict access control policies and consider disabling Wi-Fi SSID broadcast if feasible to reduce exposure. 10. Maintain up-to-date asset inventories and vulnerability management processes to quickly respond to emerging threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6914b35c224357dd22fa7e39
Added to database: 11/12/2025, 4:18:36 PM
Last enriched: 11/19/2025, 4:59:55 PM
Last updated: 11/22/2025, 2:07:58 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighCVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.