Skip to main content

CVE-2025-46627: n/a in n/a

High
VulnerabilityCVE-2025-46627cvecve-2025-46627
Published: Thu May 01 2025 (05/01/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.

AI-Powered Analysis

AILast updated: 07/03/2025, 07:27:08 UTC

Technical Analysis

CVE-2025-46627 is a high-severity vulnerability affecting the Tenda RX2 Pro router firmware version 16.03.30.14. The vulnerability stems from the use of weak credentials for the device's telnet service, allowing an unauthenticated attacker to gain access by calculating the root password. The root password is derived from the last two digits or octets of the device's MAC address, which is easily obtainable information. This means that an attacker does not need prior authentication or user interaction to exploit this flaw. The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer, but here it is more about weak credential generation. The CVSS v3.1 score is 8.2, indicating a high severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact but limited integrity and no availability impact. Exploiting this vulnerability would allow an attacker to authenticate to the telnet service as root, potentially enabling unauthorized access to the device’s configuration and network traffic, leading to further compromise of the internal network or interception of sensitive data. No patches or fixes have been published yet, and there are no known exploits in the wild at the time of publication. However, the ease of password derivation from the MAC address makes this vulnerability a significant risk for affected devices.

Potential Impact

For European organizations, this vulnerability poses a substantial risk especially for those using Tenda RX2 Pro routers in their network infrastructure. Unauthorized telnet access as root could lead to full device compromise, allowing attackers to manipulate network configurations, intercept or redirect traffic, deploy malware, or use the device as a pivot point for lateral movement within the network. This could result in confidentiality breaches of sensitive corporate or personal data, disruption of network services, and potential regulatory non-compliance under GDPR if personal data is exposed. The lack of availability impact reduces the risk of denial-of-service, but the high confidentiality impact and ease of exploitation without authentication make it a critical concern. Organizations relying on these routers for home office setups or small branch offices may be particularly vulnerable if these devices are not segmented or monitored. The absence of patches increases the urgency for mitigation measures to prevent exploitation.

Mitigation Recommendations

Given the absence of official patches, European organizations should take immediate practical steps to mitigate this vulnerability. First, disable the telnet service on all Tenda RX2 Pro devices if possible, replacing it with more secure management protocols such as SSH with strong authentication. If telnet cannot be disabled, restrict access to the telnet port via firewall rules to trusted management networks only. Network segmentation should be enforced to isolate vulnerable devices from critical infrastructure and sensitive data. Monitoring and logging of telnet access attempts should be enabled to detect potential exploitation attempts. Organizations should inventory their network devices to identify any Tenda RX2 Pro routers and consider replacing them with devices from vendors with better security track records. Additionally, changing the MAC address (MAC spoofing) to disrupt the predictable password derivation could be a temporary workaround, though this may not be feasible in all environments. Finally, organizations should stay alert for any patch releases or vendor advisories and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec01a

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/3/2025, 7:27:08 AM

Last updated: 7/27/2025, 2:24:41 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats