A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fiberhome
Fiberhome hg6145f1 Fiberhome rp4423 |
|
| Vendors & Products |
Fiberhome
Fiberhome hg6145f1 Fiberhome rp4423 |
Thu, 13 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Wed, 12 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-12T00:00:00.000Z
Updated: 2025-11-13T15:55:57.714Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63353
Updated: 2025-11-13T15:55:48.400Z
Status : Awaiting Analysis
Published: 2025-11-12T16:15:36.877
Modified: 2025-11-13T16:15:53.553
Link: CVE-2025-63353
No data.