9.8
CVE-2025-63353
- EPSS 2.05%
- Veröffentlicht 12.11.2025 16:15:36
- Zuletzt bearbeitet 31.12.2025 16:52:00
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fiberhome ≫ Hg6145f1 Firmware Versionrp4423
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.05% | 0.834 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.