A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device's factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
References
| Link | Resource |
|---|---|
| https://github.com/hanianis/CVE-2025-63353 | Third Party Advisory |
| https://medium.com/@hanianis.bouzid/fiberhome-gpon-onu-model-hg6145f1-router-predictable-wifi-passwords-and-real-risks-d8e54da385d3 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
31 Dec 2025, 16:52
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:fiberhome:hg6145f1:-:*:*:*:*:*:*:* cpe:2.3:o:fiberhome:hg6145f1_firmware:rp4423:*:*:*:*:*:*:* |
|
| References | () https://github.com/hanianis/CVE-2025-63353 - Third Party Advisory | |
| References | () https://medium.com/@hanianis.bouzid/fiberhome-gpon-onu-model-hg6145f1-router-predictable-wifi-passwords-and-real-risks-d8e54da385d3 - Exploit, Third Party Advisory | |
| First Time |
Fiberhome hg6145f1 Firmware
Fiberhome Fiberhome hg6145f1 |
13 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-284 |
12 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-12 16:15
Updated : 2025-12-31 16:52
NVD link : CVE-2025-63353
Mitre link : CVE-2025-63353
CVE.ORG link : CVE-2025-63353
JSON object : View
Products Affected
fiberhome
- hg6145f1
- hg6145f1_firmware
CWE
CWE-284
Improper Access Control
