Hackers exploit Four-Faith router flaw to open reverse shells
Threat actors are exploiting a post-authentication remote command injection vulnerability in Four-Faith routers tracked as CVE-2024-12856 to open reverse shells back to the attackers.
The malicious activity was discovered by VulnCheck, who informed Four-Faith about the active exploitation on December 20, 2024. However, it is unclear if security updates for the vulnerability are currently available.
"We notified Four-Faith and our customers about this issue on December 20, 2024. Questions about patches, affected models, and affected firmware versions should be directed at Four-Faith." explains the VulnCheck report.
Flaw details and scope
CVE-2024-12856 is an OS command injection flaw impacting Four-Faith router models F3x24 and F3x36, typically deployed in energy and utilities, transportation, telecommunications, and manufacturing sectors.
VulnCheck says hackers can gain access to those devices because many are configured with default credentials, which are easy to brute force.
The attack begins with the transmission of a specially crafted HTTP POST request to the router's '/apply.cgi' endpoint targeting the 'adj_time_year' parameter.
This is a parameter used for adjusting the system time, but it can be manipulated to include a shell command.
VulnCheck warns that the current attacks are similar to those targeting CVE-2019-12168, a similar flaw through the apply.cgi endpoint, but which performs code injection through the "ping_ip" parameter.
VulnCheck shared a sample payload that creates a reverse shell to an attacker's computer, giving them full remote access to the routers.

After the device's compromise, the attackers may modify its configuration files for persistence, explore the network for other devices to pivot to, and generally escalate the attack.
Censys reports that there are currently 15,000 internet-facing Four-Faith routers that could become targets.
Users of those devices should ensure they're running the latest firmware version for their model and change the default credentials to something unique and strong (long).
VulnCheck has also shared a Suricata rule to detect CVE-2024-12856 exploitation attempts and block them in time.
Finally, users should contact their Four-Faith sales representative or customer support agent to request advice on how to mitigate CVE-2024-12856.
source: BleepingComputer
Free online web security scanner
Top News:

New NailaoLocker ransomware used against EU healthcare orgs
February 20, 2025
Black Basta ransomware gang's internal chat logs leak online
February 21, 2025
Windows Server 2025 released—here are the new features
November 5, 2024
SonicWall firewall bug leveraged in attacks after PoC exploit release
February 15, 2025
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
February 19, 2025
SpyLend Android malware downloaded 100,000 times from Google Play
February 22, 2025