Routers in Peril: Four-Faith Flaw Becomes Hacker’s Playground!
Attention Four-Faith router owners! Threat actors are exploiting a high-severity flaw in models F3x24 and F3x36. With default credentials, they turn a simple vulnerability into a remote command execution party. Time to change those default passwords and keep your routers safe from cyber shenanigans!

Hot Take:
Looks like the Four-Faith routers are having a crisis of faith! Who knew that a simple system time change could turn into a hacker’s New Year’s party trick? If your router starts to sound like it’s hosting a secret hacking convention, it might be time to check those default passwords!
Key Points:
- VulnCheck has identified a high-severity flaw affecting Four-Faith routers, specifically models F3x24 and F3x36.
- The vulnerability, CVE-2024-12856, allows for OS command injection through HTTP when system time is modified.
- Default credentials on these routers can turn authenticated attacks into unauthenticated ones.
- Over 15,800 devices are vulnerable to this exploit, potentially enabling reverse shell attacks.
- GreyNoise has observed related exploitation attempts as recently as December 2024.
Already a member? Log in here