Router Ruckus: Four-Faith Flaw Sparks Security Fiasco!
Threat actors are exploiting CVE-2024-12856 in Four-Faith routers, creating reverse shells for remote access. VulnCheck discovered this menace and notified Four-Faith. The flaw affects models F3x24 and F3x36, especially those using default credentials. Users should update firmware, change passwords, and contact Four-Faith for mitigation advice.

Hot Take:
Looks like Four-Faith routers have found faith in keeping the doors wide open for hackers! Who knew adjusting the time on your router could turn into a time bomb for your network security? It’s like giving burglars the key to your house just because they asked nicely!
Key Points:
- Vulnerability CVE-2024-12856 affects Four-Faith routers, specifically models F3x24 and F3x36.
- The flaw allows for remote command injection via a manipulated HTTP POST request.
- Many routers still use default credentials, making them easy targets for hackers.
- Approximately 15,000 routers are currently exposed to the internet and at risk.
- VulnCheck has provided a Suricata rule to detect and block exploitation attempts.
Already a member? Log in here