The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.
The product is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information.
Link | Tags |
---|---|
https://vulncheck.com/advisories/four-faith-hard-coded-creds | third party advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752 | third party advisory |