The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
Metrics
Affected Vendors & Products
References
History
Fri, 19 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Four-faith f3x24 Firmware
Four-faith f3x36 Four-faith f3x36 Firmware |
|
CPEs | cpe:2.3:h:four-faith:f3x24:-:*:*:*:*:*:*:* cpe:2.3:h:four-faith:f3x36:-:*:*:*:*:*:*:* cpe:2.3:o:four-faith:f3x24_firmware:2.0:*:*:*:*:*:*:* cpe:2.3:o:four-faith:f3x36_firmware:2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Four-faith f3x24 Firmware
Four-faith f3x36 Four-faith f3x36 Firmware |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 27 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 27 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi. Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue. | |
Title | Four-Faith Industrial Router adjust_sys_time OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2024-12-27T16:03:04.567Z
Updated: 2025-01-28T15:24:42.019Z
Reserved: 2024-12-20T16:13:34.537Z
Link: CVE-2024-12856

Updated: 2024-12-27T17:07:49.320Z

Status : Analyzed
Published: 2024-12-27T16:15:23.403
Modified: 2025-09-19T19:04:56.827
Link: CVE-2024-12856

No data.