Skip to main content

CVE-2025-52364: n/a

High
VulnerabilityCVE-2025-52364cvecve-2025-52364
Published: Wed Jul 09 2025 (07/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present

AI-Powered Analysis

AILast updated: 07/09/2025, 15:10:05 UTC

Technical Analysis

CVE-2025-52364 is a security vulnerability identified in the firmware of the Tenda CP3 Pro router, specifically version V22.5.4.93. The vulnerability arises from insecure permissions that cause the telnet service (telnetd) to be enabled by default at device boot through the initialization script located at /etc/init.d/eth.sh. Telnet is an unencrypted protocol that allows remote command-line access to the device. Because the service is enabled by default, remote attackers can potentially connect to the router's shell interface over the network. The risk is further exacerbated if the device is configured with default or weak credentials, as attackers could gain unauthorized access without needing to bypass authentication mechanisms. This vulnerability exposes the device to remote code execution and full control by attackers, enabling them to manipulate network traffic, install malware, or pivot to other internal systems. Although no known exploits are currently reported in the wild, the presence of an open telnet service with weak or default credentials is a critical security weakness that can be easily exploited by attackers scanning for vulnerable devices. The lack of a CVSS score indicates that the vulnerability is newly published and may not yet have been fully assessed, but the technical details clearly indicate a high-risk scenario due to the combination of default enabled remote access and weak authentication controls.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially for small and medium enterprises or home office environments that commonly use consumer-grade routers like the Tenda CP3 Pro. Compromise of these devices can lead to unauthorized network access, interception of sensitive data, and disruption of network availability. Attackers gaining shell access could alter device configurations, redirect traffic to malicious servers, or create persistent backdoors. This could result in data breaches, loss of confidentiality, and potential lateral movement within corporate networks. Given the widespread use of Tenda routers in residential and small business markets across Europe, the vulnerability could be exploited to launch large-scale botnet attacks or targeted intrusions. Additionally, critical infrastructure or organizations with remote sites using these devices may face operational disruptions. The unencrypted nature of telnet also increases the risk of credential interception on local networks, compounding the threat. Overall, the vulnerability undermines network perimeter security and could facilitate broader cyberattacks affecting European organizations' confidentiality, integrity, and availability.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using the Tenda CP3 Pro router with firmware version V22.5.4.93 or similar. Immediate steps include disabling the telnet service on the device, either through the router's administrative interface or by applying configuration changes to prevent the /etc/init.d/eth.sh script from enabling telnet at boot. If disabling telnet is not possible, changing default credentials to strong, unique passwords is critical to prevent unauthorized access. Network segmentation should be employed to isolate vulnerable devices from sensitive internal networks. Organizations should also monitor network traffic for unusual telnet connections and implement intrusion detection systems to alert on suspicious activity. Firmware updates should be applied as soon as Tenda releases a patched version addressing this issue. Where possible, replacing vulnerable devices with more secure alternatives that do not enable telnet by default is advisable. Additionally, organizations should educate users about the risks of default credentials and encourage regular password updates. Finally, restricting remote management access to trusted IP addresses or VPN connections can reduce exposure to external attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686e82c46f40f0eb72045fe7

Added to database: 7/9/2025, 2:55:00 PM

Last enriched: 7/9/2025, 3:10:05 PM

Last updated: 7/9/2025, 4:07:19 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats