Reference:
Advisory #2025-29
Version:
1.0
Affected software:
Four-Faith F3x36 router using firmware v2.0.0
Type:
Authentication bypass, Remote code execution
CVE/CVSS:
CVE-2024-9643: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVE-2024-9644: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Sources
Risks
On February 4, 2025, NIST's National Vulnerability Database (NVD) listed two critical flaws in the Four-Faith F3x36 router (firmware v2.0.0).
Four-Faith routers are industrial-grade routers and a lucrative target for botnets. In December 2024, Chainxin X Lab observed a Mirai-based botnet exploiting zero-day flaws in these devices. CVE-2024-9643 and CVE-2024-9644 will likely be weaponized soon, raising the risk of large-scale attacks. Immediate patching is critical.
Successful exploitation of CVE-2025-9643 and/or CVE-2025-9644 could severely impact the affected systems' confidentiality, integrity, and availability.
Description
CVE-2024-9643 originates from hard-coded credentials in the web server, allowing a remote attacker to bypass authentication with a crafted HTTP request. If successful, the attacker gains complete administrative control over the router.
CVE-2024-9644 is an authentication bypass vulnerability in the "bapply.cgi" endpoint, which lacks proper access controls. CVE-2024-9644 allows a remote attacker to change router settings or combine it with other authenticated vulnerabilities to stage a more severe attack.
Recommended Actions
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
References
https://vulncheck.com/advisories/four-faith-hidden-api