The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
History

Tue, 04 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 15:00:00 +0000

Type Values Removed Values Added
Description The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
Title Four-Faith F3x36 bapply.cgi Auth Bypass
Weaknesses CWE-306
CWE-489
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-02-04T15:49:20.305Z

Reserved: 2024-10-08T18:08:01.273Z

Link: CVE-2024-9644

cve-icon Vulnrichment

Updated: 2025-02-04T15:49:14.364Z

cve-icon NVD

Status : Received

Published: 2025-02-04T15:15:19.273

Modified: 2025-02-04T15:15:19.273

Link: CVE-2024-9644

cve-icon Redhat

No data.