## https://sploitus.com/exploit?id=SAINT:09122D97582D8849832B2C775814DEFD
Added: 01/03/2025
### Background
Four Faith F3x24 is a wifi industrial router. F3x36 is an LTE wireless router.
### Problem
A default password and command injection vulnerability in the `**adjust_sys_time**` function in the F3x24 and F3x36 routers could allow an attacker to execute arbitrary commands.
### Resolution
Change the default password and contact Four-Faith for patch information.
### References
https://vulncheck.com/blog/four-faith-cve-2024-12856
### Limitations
The target device must have the default password in order for this exploit to succeed.