A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
References
Configurations
No configuration.
History
13 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-284 |
12 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-12 16:15
Updated : 2025-11-13 16:15
NVD link : CVE-2025-63353
Mitre link : CVE-2025-63353
CVE.ORG link : CVE-2025-63353
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control
