We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12856

Four-Faith Industrial Router adjust_sys_time OS Command Injection



Description

The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.

Reserved 2024-12-20 | Published 2024-12-27 | Updated 2024-12-31 | Assigner VulnCheck


HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

2.0
affected

Default status
unknown

2.0
affected

References

vulncheck.com/blog/four-faith-cve-2024-12856 exploit technical-description

vulncheck.com/advisories/four-faith-time third-party-advisory

ducklingstudio.blog.fc2.com/blog-entry-392.html exploit

cve.org (CVE-2024-12856)

nvd.nist.gov (CVE-2024-12856)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-12856

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.