[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-28879":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":45},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":42,"name":43,"published":44,"updated":27},28879,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":35,"epss_score":36,"epss_percentile":37,"cve":38,"in_cisa_catalog":40,"date":41,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"critical","Attackers can gain unauthorized administrative access, potentially leading to full control over the device.","Four-Faith F3x36 router with firmware v2.0.0 contains an authentication bypass caused by hard-coded credentials in the administrative web server, letting attackers with knowledge of credentials gain administrative access via crafted HTTP requests.","Update to the latest firmware version provided by the vendor to fix hard-coded credential issues.",[33,34],"https://vulncheck.com/advisories/four-faith-hard-coded-creds","https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752",9.8,0.19604,0.9539,[39],"CVE-2024-9643",false,"2025-02-04T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2024-9643","Four-Faith F3x36 - Authentication Bypass","2026-02-17T00:00:00Z",["Island",46],{"key":47,"params":48,"result":50},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":49},"{\"text-color\":\"gray\"}",{"head":51},{}]