CVE-2025-52364: n/a
Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present
AI Analysis
Technical Summary
CVE-2025-52364 is a high-severity vulnerability affecting the Tenda CP3 Pro router firmware version V22.5.4.93. The issue arises from insecure permissions configured in the device's initialization scripts, specifically /etc/init.d/eth.sh, which enables the telnet service (telnetd) by default upon boot. This configuration allows remote attackers to connect to the device's shell interface over the network without requiring authentication, especially if default or weak credentials remain unchanged. The vulnerability is classified under CWE-1391, indicating improper access control or insecure default permissions. The CVSS v3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and high impact on confidentiality. While no known exploits are currently reported in the wild, the presence of an open telnet service with potential unauthenticated access poses a significant risk. Attackers could leverage this to gain unauthorized access to the router, potentially intercepting or manipulating network traffic, deploying malware, or using the device as a foothold for further attacks within the network. The lack of authentication and the default enabling of telnet make this vulnerability particularly dangerous, as it lowers the barrier for exploitation.
Potential Impact
For European organizations, this vulnerability could have serious consequences. Routers like the Tenda CP3 Pro are commonly used in small to medium-sized enterprises and home office environments. Unauthorized access to these devices could lead to interception of sensitive data, disruption of network services, or lateral movement within corporate networks. Given the high confidentiality impact, attackers could exfiltrate sensitive information passing through the compromised router. The absence of integrity and availability impacts in the CVSS vector suggests that while data manipulation or service disruption is less likely, the breach of confidentiality alone is critical. Additionally, compromised routers can be enlisted into botnets or used to launch attacks against other targets, increasing the broader threat landscape. European organizations with remote or distributed workforces relying on such devices are particularly vulnerable, as attackers can exploit this remotely without physical access. The risk is amplified if default credentials are not changed, a common misconfiguration in many deployments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately verify if their Tenda CP3 Pro devices are running firmware version V22.5.4.93 or earlier and disable the telnet service if it is enabled by default. This can be done by accessing the device's configuration interface or via command line if accessible. 2) Change all default credentials to strong, unique passwords to prevent unauthorized access. 3) If possible, update the firmware to a patched version once Tenda releases one addressing this issue. Since no patch links are currently available, organizations should monitor vendor advisories closely. 4) Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data flows. 5) Employ network-level controls such as firewall rules to block inbound telnet (TCP port 23) traffic from untrusted networks, especially the internet. 6) Conduct regular network scans to detect open telnet services and unauthorized access attempts. 7) Educate users and administrators about the risks of default credentials and insecure services. These steps go beyond generic advice by focusing on immediate disabling of vulnerable services, credential management, network controls, and monitoring tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-52364: n/a
Description
Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present
AI-Powered Analysis
Technical Analysis
CVE-2025-52364 is a high-severity vulnerability affecting the Tenda CP3 Pro router firmware version V22.5.4.93. The issue arises from insecure permissions configured in the device's initialization scripts, specifically /etc/init.d/eth.sh, which enables the telnet service (telnetd) by default upon boot. This configuration allows remote attackers to connect to the device's shell interface over the network without requiring authentication, especially if default or weak credentials remain unchanged. The vulnerability is classified under CWE-1391, indicating improper access control or insecure default permissions. The CVSS v3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and high impact on confidentiality. While no known exploits are currently reported in the wild, the presence of an open telnet service with potential unauthenticated access poses a significant risk. Attackers could leverage this to gain unauthorized access to the router, potentially intercepting or manipulating network traffic, deploying malware, or using the device as a foothold for further attacks within the network. The lack of authentication and the default enabling of telnet make this vulnerability particularly dangerous, as it lowers the barrier for exploitation.
Potential Impact
For European organizations, this vulnerability could have serious consequences. Routers like the Tenda CP3 Pro are commonly used in small to medium-sized enterprises and home office environments. Unauthorized access to these devices could lead to interception of sensitive data, disruption of network services, or lateral movement within corporate networks. Given the high confidentiality impact, attackers could exfiltrate sensitive information passing through the compromised router. The absence of integrity and availability impacts in the CVSS vector suggests that while data manipulation or service disruption is less likely, the breach of confidentiality alone is critical. Additionally, compromised routers can be enlisted into botnets or used to launch attacks against other targets, increasing the broader threat landscape. European organizations with remote or distributed workforces relying on such devices are particularly vulnerable, as attackers can exploit this remotely without physical access. The risk is amplified if default credentials are not changed, a common misconfiguration in many deployments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately verify if their Tenda CP3 Pro devices are running firmware version V22.5.4.93 or earlier and disable the telnet service if it is enabled by default. This can be done by accessing the device's configuration interface or via command line if accessible. 2) Change all default credentials to strong, unique passwords to prevent unauthorized access. 3) If possible, update the firmware to a patched version once Tenda releases one addressing this issue. Since no patch links are currently available, organizations should monitor vendor advisories closely. 4) Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data flows. 5) Employ network-level controls such as firewall rules to block inbound telnet (TCP port 23) traffic from untrusted networks, especially the internet. 6) Conduct regular network scans to detect open telnet services and unauthorized access attempts. 7) Educate users and administrators about the risks of default credentials and insecure services. These steps go beyond generic advice by focusing on immediate disabling of vulnerable services, credential management, network controls, and monitoring tailored to this specific vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686e82c46f40f0eb72045fe7
Added to database: 7/9/2025, 2:55:00 PM
Last enriched: 7/16/2025, 8:51:40 PM
Last updated: 8/21/2025, 3:38:37 PM
Views: 51
Related Threats
CVE-2025-57801: CWE-347: Improper Verification of Cryptographic Signature in Consensys gnark
HighCVE-2025-50859: n/a
HighCVE-2025-50858: n/a
HighCVE-2025-55454: n/a
HighCVE-2025-51092: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.