Skip to main content

CVE-2025-46629: n/a in n/a

Medium
VulnerabilityCVE-2025-46629cvecve-2025-46629
Published: Thu May 01 2025 (05/01/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet

AI-Powered Analysis

AILast updated: 06/26/2025, 00:42:51 UTC

Technical Analysis

CVE-2025-46629 is a medium-severity vulnerability affecting the Tenda RX2 Pro router, specifically in the 'ate' management binary component of firmware version 16.03.30.14. The vulnerability arises due to a lack of proper access controls on the 'ate' binary, which when enabled, listens for UDP packets. An unauthenticated remote attacker can exploit this by sending a specially crafted UDP packet to the device, allowing unauthorized configuration changes without any authentication or user interaction. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the affected component does not enforce restrictions on who can perform sensitive operations. The CVSS v3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No patches or vendor advisories have been published yet, and there are no known exploits in the wild at this time. The vulnerability allows an attacker to alter router configurations remotely, which could lead to interception or redirection of network traffic, weakening network security and potentially enabling further attacks such as man-in-the-middle or persistent backdoors. Since the 'ate' binary is not enabled by default on all devices, exploitation depends on this feature being active, which may be the case in testing or diagnostic environments or certain deployments. The vulnerability affects a specific Tenda router model and firmware version, limiting the scope but still posing a risk to affected users.

Potential Impact

For European organizations using the Tenda RX2 Pro router with the vulnerable firmware and 'ate' binary enabled, this vulnerability could lead to unauthorized changes in router configurations. This may compromise network confidentiality and integrity by allowing attackers to redirect traffic, intercept sensitive data, or disable security features. Such unauthorized configuration changes could also undermine trust in network infrastructure and lead to data breaches or disruption of business operations. Small and medium enterprises (SMEs) and home office setups that rely on this router model are particularly at risk, as they may lack robust network monitoring and incident response capabilities. Critical infrastructure operators or enterprises with stringent network security requirements are less likely to use consumer-grade routers like the Tenda RX2 Pro, but any deployment in branch offices or remote sites could be vulnerable. The absence of known exploits reduces immediate risk, but the ease of exploitation (no authentication or user interaction required) means attackers could quickly develop exploits once the vulnerability is publicized. The impact is primarily on confidentiality and integrity, with no direct availability impact, but indirect availability issues could arise if attackers disrupt configurations.

Mitigation Recommendations

1. Immediately verify whether the 'ate' binary is enabled on all Tenda RX2 Pro routers within the organization. Disable the 'ate' feature if it is not required, as this will eliminate the attack surface. 2. For routers where 'ate' must remain enabled, implement network-level filtering to block incoming UDP packets targeting the management interface from untrusted networks, especially from the internet. 3. Restrict remote management access to the router by limiting it to trusted IP addresses and using VPNs for remote administration. 4. Monitor network traffic for unusual UDP packets directed at the router, which may indicate exploitation attempts. 5. Regularly check for firmware updates or vendor advisories from Tenda and apply patches promptly once available. 6. Consider replacing vulnerable Tenda RX2 Pro devices with routers from vendors that provide timely security updates and have stronger access control mechanisms. 7. Educate IT staff and users about the risks of enabling diagnostic or management features like 'ate' on production devices without proper access controls. 8. Conduct periodic security assessments of network devices to identify and remediate similar access control weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec02d

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/26/2025, 12:42:51 AM

Last updated: 7/27/2025, 8:03:52 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats