Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Mini Shai-Hulud Supply Chain Attack Compromises Packages Compromised
May 19, 2026
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Critical Apache Flink Vulnerability Enables Remote code execution
May 19, 2026
Home/CyberSecurity News/Hackers Hijack Four-Faith Industrial Routers for Hijacking Botnet
CyberSecurity News

Hackers Hijack Four-Faith Industrial Routers for Hijacking Botnet

A critical vulnerability, identified as CVE-2024-9643, in Four-Faith industrial routers is now under active exploitation. Threat actors are leveraging this flaw to build botnets. Security researchers...

Sarah simpson
Sarah simpson
May 19, 2026 3 Min Read
1 0

A critical vulnerability, identified as CVE-2024-9643, in Four-Faith industrial routers is now under active exploitation. Threat actors are leveraging this flaw to build botnets.

Security researchers from CrowdSec report a sharp rise in exploitation attempts targeting these devices, signaling a shift from initial probing to large-scale abuse.

CVE-2024-9643 is a critical authentication bypass flaw affecting Four-Faith F3x36 industrial cellular routers.

The vulnerability stems from hard-coded administrative credentials embedded in the device’s web management interface.

Attackers can use these credentials to send specially crafted HTTP requests to endpoints such as /Status_Router.asp, gaining full administrative access without proper authentication.

With a CVSS score of 9.8, the flaw allows attackers to:

  • Bypass login mechanisms and obtain admin privileges.
  • Modify router configurations and network settings.
  • Extract sensitive operational data.
  • Establish persistent control over the device.

Publicly available exploit templates, including a Nuclei detection script, have further simplified automated scanning and exploitation.

Exploit timeline (Source: Crowdsec)
Exploit timeline (Source: Crowdsec)

Four-Faith Routers Targeted by Botnets

The vulnerability was disclosed on February 4, 2025, but exploitation in the wild began on April 20, 2026.

According to CrowdSec telemetry, at least 139 unique IP addresses have been involved in attacks as of May 18.

Due to the rapid increase in activity, the issue was reclassified into the “Mass Exploitation” phase on May 12, 2026.

The primary objective observed in 76% of attacks is the takeover of infrastructure. Once compromised, routers are integrated into botnets, allowing threat actors to:

  • Launch distributed denial-of-service (DDoS) attacks.
  • Proxy malicious traffic to hide the attacker’s origins.
  • Use compromised devices as footholds for lateral movement.

The campaign is globally distributed, with attack sources identified in the United Kingdom, Germany, the United States, and the Netherlands, indicating automated, large-scale scanning operations.

Attack location (Source: Crowdsec)
Attack location (Source: Crowdsec)

Four-Faith F3x36 routers are widely deployed in industrial and remote environments, including warehouses, retail outlets, utilities, and branch offices.

These devices often operate at the network edge and are rarely updated or monitored closely.

This makes them ideal targets. A compromised router not only provides persistent access but also allows attackers to intercept traffic and pivot deeper into internal networks.

In many cases, these devices become long-term assets in botnet infrastructure due to poor visibility and patching practices.

Mitigation and Defense

Organizations using Four-Faith routers should take immediate action:

  • Apply vendor- or supplier-provided firmware updates without delay.
  • Restrict access to router management interfaces using firewalls or VPNs.
  • Monitor network traffic for unusual outbound connections or scanning behavior.
  • Deploy threat detection tools such as CrowdSec to identify exploitation attempts.
  • Block known malicious IPs using threat intelligence feeds, such as CrowdSec CTI blocklists.

Security researchers, including Cisco Talos and VulnCheck, have previously highlighted the risks posed by hard-coded credentials in network devices, underscoring the importance of secure configuration practices.

As attackers continue to weaponize exposed edge devices, unpatched industrial routers remain a high-risk entry point for botnet expansion and broader cyberattacks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Compromised GitHub Action Exfiltrates Workflow Credentials to

Next Post

Critical Apache Flink Vulnerability Enables Remote code execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Edge Fails to Load Saved Passwords at Startup
May 19, 2026
Attackers Exfiltrate Files via Cloudflare Storage Endpoints
May 19, 2026
VoidStealer Malware Bypasses Chrome Encryption Chrome’s App-Bound
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us