CVE-2024-12856
CVE-2024-12856: OS Command Injection in Four-Faith Routers. This vulnerability allows remote attackers to execute arbitrary operating system commands via HTTP on Four-Faith F3x24 and F3x36 routers when modifying the system time.
The vulnerability impacts firmware version 2.0 and requires authentication, but the presence of default credentials turns it into an unauthenticated threat if those defaults are not changed. An exploit is readily available, and it is actively being exploited in the wild. This means attackers are actively trying to leverage this vulnerability. The SVRS score is 68, indicating a serious risk, while not critical, requires attention.
Successful exploitation could lead to complete control of the affected router, potentially allowing attackers to pivot to other network resources. This vulnerability poses a significant risk to organizations using these router models, especially if they have not changed the default credentials. Immediate action is required to mitigate the risks, including changing default credentials and applying available security patches.
Description
CVE-2024-12856 affects Four-Faith router models F3x24 and F3x36, specifically firmware version 2.0. This vulnerability allows authenticated and remote attackers to execute arbitrary OS commands through the apply.cgi
interface when modifying the system time. Furthermore, the default credentials present in this firmware version, if not changed, effectively transform the vulnerability into an unauthenticated and remote OS command execution issue. The SVRS for this vulnerability is 46, indicating a moderate risk level.
Key Insights
- Remote Code Execution: This vulnerability allows attackers to execute arbitrary code on the affected routers, potentially granting them full control over the device.
- Default Credentials: The presence of default credentials significantly increases the risk as attackers can exploit the vulnerability without any prior authentication.
- In The Wild: This vulnerability is actively exploited by hackers, highlighting the urgency of addressing it.
- Limited Scope: While the vulnerability affects specific models and firmware versions, it is essential to understand the potential impact of successful exploitation, including data breaches, denial-of-service attacks, and network disruption.
Mitigation Strategies
- Firmware Updates: Immediately update affected routers to the latest firmware version which addresses the vulnerability.
- Credential Change: Change the default credentials on all affected routers to strong and unique passwords.
- Network Segmentation: Implement network segmentation to isolate affected routers from critical systems and sensitive data.
- Monitoring and Detection: Continuously monitor network traffic and system logs for any suspicious activity that might indicate exploitation of this vulnerability.
Additional Information
For further information or clarification regarding this specific incident or other cybersecurity concerns, utilize the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for assistance.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.