CVE-2025-63353
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-12

Last updated on: 2025-12-31

Assigner: MITRE

Description
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-12
Last Modified
2025-12-31
Generated
2026-05-06
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
fiberhome hg6145f1_firmware rp4423
fiberhome hg6145f1 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-63353 is a vulnerability in the FiberHome GPON ONU HG6145F1 router where the factory default Wi-Fi password can be predicted from the SSID. The device generates default passwords using a deterministic algorithm that relates the SSID and password through a mathematical equation: the hexadecimal suffix of the SSID plus the hexadecimal suffix of the password equals 0xFFFFFF. This allows an attacker who can see the SSID to compute the default password without any authentication or user interaction. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to your wireless network because an attacker can predict the default Wi-Fi password just by observing the SSID. This unauthorized access can result in data theft, surveillance, and compromise of network security. Attackers could exploit this to intercept sensitive information or use your network for malicious activities. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying FiberHome GPON ONU HG6145F1 devices on your network and checking their SSIDs. Since the SSID follows a pattern like "fh_<hexadecimal_string>", you can scan for SSIDs matching this pattern. Once identified, you can compute the default password by subtracting the hexadecimal value in the SSID from 0xFFFFFF. For example, using command-line tools like 'iwlist' or 'nmcli' on Linux to scan Wi-Fi networks and extract SSIDs. Then, use a script or calculator to perform the subtraction to predict the default password. Example command to scan SSIDs: `sudo iwlist wlan0 scan | grep ESSID`. After obtaining the SSID, extract the hex part and compute the password as described. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include changing the default SSID and Wi-Fi password to unpredictable values, disabling WPS (Wi-Fi Protected Setup), updating the router firmware if updates are available, segregating critical traffic on separate devices or networks, and considering replacing the ISP-provided router if the vulnerability cannot be fixed. These actions reduce the risk of unauthorized access due to predictable default passwords. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart