CVE-2025-46627: n/a in n/a
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
AI Analysis
Technical Summary
CVE-2025-46627 is a high-severity vulnerability affecting the Tenda RX2 Pro router firmware version 16.03.30.14. The vulnerability stems from the use of weak credentials for the device's telnet service, allowing an unauthenticated attacker to gain access by calculating the root password. The root password is derived from the last two digits or octets of the device's MAC address, which is easily obtainable information. This means that an attacker does not need prior authentication or user interaction to exploit this flaw. The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer, but here it is more about weak credential generation. The CVSS v3.1 score is 8.2, indicating a high severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact but limited integrity and no availability impact. Exploiting this vulnerability would allow an attacker to authenticate to the telnet service as root, potentially enabling unauthorized access to the device’s configuration and network traffic, leading to further compromise of the internal network or interception of sensitive data. No patches or fixes have been published yet, and there are no known exploits in the wild at the time of publication. However, the ease of password derivation from the MAC address makes this vulnerability a significant risk for affected devices.
Potential Impact
For European organizations, this vulnerability poses a substantial risk especially for those using Tenda RX2 Pro routers in their network infrastructure. Unauthorized telnet access as root could lead to full device compromise, allowing attackers to manipulate network configurations, intercept or redirect traffic, deploy malware, or use the device as a pivot point for lateral movement within the network. This could result in confidentiality breaches of sensitive corporate or personal data, disruption of network services, and potential regulatory non-compliance under GDPR if personal data is exposed. The lack of availability impact reduces the risk of denial-of-service, but the high confidentiality impact and ease of exploitation without authentication make it a critical concern. Organizations relying on these routers for home office setups or small branch offices may be particularly vulnerable if these devices are not segmented or monitored. The absence of patches increases the urgency for mitigation measures to prevent exploitation.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate practical steps to mitigate this vulnerability. First, disable the telnet service on all Tenda RX2 Pro devices if possible, replacing it with more secure management protocols such as SSH with strong authentication. If telnet cannot be disabled, restrict access to the telnet port via firewall rules to trusted management networks only. Network segmentation should be enforced to isolate vulnerable devices from critical infrastructure and sensitive data. Monitoring and logging of telnet access attempts should be enabled to detect potential exploitation attempts. Organizations should inventory their network devices to identify any Tenda RX2 Pro routers and consider replacing them with devices from vendors with better security track records. Additionally, changing the MAC address (MAC spoofing) to disrupt the predictable password derivation could be a temporary workaround, though this may not be feasible in all environments. Finally, organizations should stay alert for any patch releases or vendor advisories and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-46627: n/a in n/a
Description
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
AI-Powered Analysis
Technical Analysis
CVE-2025-46627 is a high-severity vulnerability affecting the Tenda RX2 Pro router firmware version 16.03.30.14. The vulnerability stems from the use of weak credentials for the device's telnet service, allowing an unauthenticated attacker to gain access by calculating the root password. The root password is derived from the last two digits or octets of the device's MAC address, which is easily obtainable information. This means that an attacker does not need prior authentication or user interaction to exploit this flaw. The vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer, but here it is more about weak credential generation. The CVSS v3.1 score is 8.2, indicating a high severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact but limited integrity and no availability impact. Exploiting this vulnerability would allow an attacker to authenticate to the telnet service as root, potentially enabling unauthorized access to the device’s configuration and network traffic, leading to further compromise of the internal network or interception of sensitive data. No patches or fixes have been published yet, and there are no known exploits in the wild at the time of publication. However, the ease of password derivation from the MAC address makes this vulnerability a significant risk for affected devices.
Potential Impact
For European organizations, this vulnerability poses a substantial risk especially for those using Tenda RX2 Pro routers in their network infrastructure. Unauthorized telnet access as root could lead to full device compromise, allowing attackers to manipulate network configurations, intercept or redirect traffic, deploy malware, or use the device as a pivot point for lateral movement within the network. This could result in confidentiality breaches of sensitive corporate or personal data, disruption of network services, and potential regulatory non-compliance under GDPR if personal data is exposed. The lack of availability impact reduces the risk of denial-of-service, but the high confidentiality impact and ease of exploitation without authentication make it a critical concern. Organizations relying on these routers for home office setups or small branch offices may be particularly vulnerable if these devices are not segmented or monitored. The absence of patches increases the urgency for mitigation measures to prevent exploitation.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate practical steps to mitigate this vulnerability. First, disable the telnet service on all Tenda RX2 Pro devices if possible, replacing it with more secure management protocols such as SSH with strong authentication. If telnet cannot be disabled, restrict access to the telnet port via firewall rules to trusted management networks only. Network segmentation should be enforced to isolate vulnerable devices from critical infrastructure and sensitive data. Monitoring and logging of telnet access attempts should be enabled to detect potential exploitation attempts. Organizations should inventory their network devices to identify any Tenda RX2 Pro routers and consider replacing them with devices from vendors with better security track records. Additionally, changing the MAC address (MAC spoofing) to disrupt the predictable password derivation could be a temporary workaround, though this may not be feasible in all environments. Finally, organizations should stay alert for any patch releases or vendor advisories and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-26T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec01a
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 7/3/2025, 7:27:08 AM
Last updated: 7/27/2025, 2:24:41 AM
Views: 13
Related Threats
CVE-2025-49559: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) in Adobe Adobe Commerce
MediumCVE-2025-49558: Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) in Adobe Adobe Commerce
MediumCVE-2025-49557: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce
HighCVE-2025-49556: Incorrect Authorization (CWE-863) in Adobe Adobe Commerce
HighCVE-2025-49555: Cross-Site Request Forgery (CSRF) (CWE-352) in Adobe Adobe Commerce
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.