A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
References
| Link | Resource |
|---|---|
| https://github.com/hanianis/CVE-2025-63353 | Third Party Advisory |
| https://medium.com/@hanianis.bouzid/fiberhome-gpon-onu-model-hg6145f1-router-predictable-wifi-passwords-and-real-risks-d8e54da385d3 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-12 16:15
Updated : 2025-12-31 16:52
NVD link : CVE-2025-63353
Mitre link : CVE-2025-63353
CVE.ORG link : CVE-2025-63353
JSON object : View
Products Affected
fiberhome
- hg6145f1_firmware
- hg6145f1
CWE
CWE-284
Improper Access Control
