The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an
authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://vulncheck.com/advisories/four-faith-hidden-api |
![]() ![]() |
History
Tue, 04 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Feb 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities. | |
Title | Four-Faith F3x36 bapply.cgi Auth Bypass | |
Weaknesses | CWE-306 CWE-489 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-02-04T15:49:20.305Z
Reserved: 2024-10-08T18:08:01.273Z
Link: CVE-2024-9644

Updated: 2025-02-04T15:49:14.364Z

Status : Received
Published: 2025-02-04T15:15:19.273
Modified: 2025-02-04T15:15:19.273
Link: CVE-2024-9644

No data.