First published: Tue Feb 04 2025(Updated: )
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
Credit: disclosure@vulncheck.com
Affected Software | Affected Version | How to fix |
---|---|---|
Four-Faith F3x36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-9644 is considered critical due to the potential for unauthorized access to administrative functions.
To fix CVE-2024-9644, update the firmware of the Four-Faith F3x36 router to the latest version that addresses this vulnerability.
The risks associated with CVE-2024-9644 include unauthorized access to router configuration, which could lead to compromise of the network.
CVE-2024-9644 affects the Four-Faith F3x36 router running firmware version 2.0.0.
Currently, disabling remote administration options could serve as a temporary workaround for CVE-2024-9644 until a firmware update is applied.