Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-63353

EPSS 0.62% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-63353

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
FiberHome GPON ONU HG6145F1 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
FiberHome GPON ONU HG6145F1是中国烽火(FiberHome)公司的一款路由器。 FiberHome GPON ONU HG6145F1 RP4423存在安全漏洞,该漏洞源于设备使用确定性算法生成默认WiFi密码,可能导致攻击者预测密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-63353

#POC DescriptionSource LinkShenlong Link
1A vulnerability in fiberhome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSIDhttps://github.com/hanianis/CVE-2025-63353POC Details
2This is a Proof-Of-Concept of CVE-2025-63353https://github.com/0xA1M/CVE-2025-63353POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-63353

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-11-12 · 19 CVEs total

CVE-2025-63645pH7 Social Dating Builder 安全漏洞
CVE-2025-52331Rarlab WinRAR 安全漏洞
CVE-2025-64281CentralSquare Community Development 安全漏洞
CVE-2025-64280CentralSquare Community Development 安全漏洞
CVE-2025-63289Sogexia Android App 安全漏洞
CVE-2025-63811jose2go 安全漏洞
CVE-2025-63929IEC104 安全漏洞
CVE-2025-63927airpig2011 IEC104 安全漏洞
CVE-2025-63679free5GC 安全漏洞
CVE-2025-60645xxl-api 安全漏洞
CVE-2025-63396PyTorch 安全漏洞
CVE-2025-63667Vatilon IP camera 安全漏洞
CVE-2025-63666Tenda AC15 安全漏洞
CVE-2025-63419CrushFTP 安全漏洞
CVE-2025-57310Simple Faucet Script 安全漏洞
CVE-2025-56385WellSky Harmony 安全漏洞
CVE-2025-59491CentralSquare Community Development 安全漏洞
CVE-2025-60646xxl-api 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-63353

No comments yet


Leave a comment