CVE-2025-53558: Use of weak credentials in ZTE Japan. K.K. ZXHN-F660T
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.
AI Analysis
Technical Summary
CVE-2025-53558 is a high-severity vulnerability affecting the ZTE Japan K.K. ZXHN-F660T and ZXHN-F660A devices, specifically versions prior to V1.0.10P17N4. The core issue is the use of a common, hardcoded credential across all installations of these devices. This means that an attacker who knows this credential can gain unauthorized access to the device without any need for user interaction or prior authentication. The vulnerability has a CVSS 3.0 base score of 8.8, reflecting its critical impact on confidentiality, integrity, and availability. The attack vector is adjacent network (AV:A), implying that the attacker must be on the same local network or connected via a network segment that can reach the device. However, the attack complexity is low (AC:L), and no privileges or user interaction are required (PR:N, UI:N). Successful exploitation allows full compromise of the device, potentially enabling attackers to intercept, manipulate, or disrupt network traffic, alter device configurations, or use the device as a pivot point for further attacks. Although no known exploits are currently reported in the wild, the simplicity of exploitation and the widespread use of these devices in certain markets make this a significant threat. The vulnerability stems from poor credential management practices, which is a common security oversight in embedded network devices.
Potential Impact
For European organizations, especially those using ZTE networking equipment or devices supplied by ZTE Japan K.K., this vulnerability poses a serious risk. Compromise of these devices can lead to unauthorized network access, data interception, and potential lateral movement within corporate networks. This can result in data breaches, disruption of business operations, and exposure of sensitive information. Given the high confidentiality, integrity, and availability impact, critical infrastructure operators, telecommunications providers, and enterprises relying on these devices for network connectivity are at particular risk. The vulnerability could also be exploited to launch further attacks such as man-in-the-middle, denial of service, or as a foothold for ransomware campaigns. The fact that exploitation requires only network adjacency means that attackers who gain access to internal networks, or who can connect via compromised VPNs or Wi-Fi, can leverage this vulnerability. This elevates the threat level for organizations with remote or hybrid work models prevalent in Europe. Additionally, regulatory compliance frameworks such as GDPR impose strict requirements on protecting personal data, and exploitation of this vulnerability could lead to significant legal and financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately identify any ZXHN-F660T or ZXHN-F660A devices in their network inventory and verify their firmware versions. Devices running versions prior to V1.0.10P17N4 must be upgraded to the latest firmware that addresses this issue. If an official patch is not yet available, organizations should implement compensating controls such as network segmentation to isolate these devices from critical systems and restrict access to trusted administrators only. Changing default or common credentials is essential; if the device allows credential customization, enforce strong, unique passwords per device. Network monitoring should be enhanced to detect unauthorized login attempts or unusual device behavior. Additionally, organizations should review and tighten access controls on management interfaces, disabling remote management if not required. For new deployments, prefer devices with robust credential management and security features. Finally, maintain close communication with ZTE and security advisories for updates or exploit reports.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-53558: Use of weak credentials in ZTE Japan. K.K. ZXHN-F660T
Description
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.
AI-Powered Analysis
Technical Analysis
CVE-2025-53558 is a high-severity vulnerability affecting the ZTE Japan K.K. ZXHN-F660T and ZXHN-F660A devices, specifically versions prior to V1.0.10P17N4. The core issue is the use of a common, hardcoded credential across all installations of these devices. This means that an attacker who knows this credential can gain unauthorized access to the device without any need for user interaction or prior authentication. The vulnerability has a CVSS 3.0 base score of 8.8, reflecting its critical impact on confidentiality, integrity, and availability. The attack vector is adjacent network (AV:A), implying that the attacker must be on the same local network or connected via a network segment that can reach the device. However, the attack complexity is low (AC:L), and no privileges or user interaction are required (PR:N, UI:N). Successful exploitation allows full compromise of the device, potentially enabling attackers to intercept, manipulate, or disrupt network traffic, alter device configurations, or use the device as a pivot point for further attacks. Although no known exploits are currently reported in the wild, the simplicity of exploitation and the widespread use of these devices in certain markets make this a significant threat. The vulnerability stems from poor credential management practices, which is a common security oversight in embedded network devices.
Potential Impact
For European organizations, especially those using ZTE networking equipment or devices supplied by ZTE Japan K.K., this vulnerability poses a serious risk. Compromise of these devices can lead to unauthorized network access, data interception, and potential lateral movement within corporate networks. This can result in data breaches, disruption of business operations, and exposure of sensitive information. Given the high confidentiality, integrity, and availability impact, critical infrastructure operators, telecommunications providers, and enterprises relying on these devices for network connectivity are at particular risk. The vulnerability could also be exploited to launch further attacks such as man-in-the-middle, denial of service, or as a foothold for ransomware campaigns. The fact that exploitation requires only network adjacency means that attackers who gain access to internal networks, or who can connect via compromised VPNs or Wi-Fi, can leverage this vulnerability. This elevates the threat level for organizations with remote or hybrid work models prevalent in Europe. Additionally, regulatory compliance frameworks such as GDPR impose strict requirements on protecting personal data, and exploitation of this vulnerability could lead to significant legal and financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately identify any ZXHN-F660T or ZXHN-F660A devices in their network inventory and verify their firmware versions. Devices running versions prior to V1.0.10P17N4 must be upgraded to the latest firmware that addresses this issue. If an official patch is not yet available, organizations should implement compensating controls such as network segmentation to isolate these devices from critical systems and restrict access to trusted administrators only. Changing default or common credentials is essential; if the device allows credential customization, enforce strong, unique passwords per device. Network monitoring should be enhanced to detect unauthorized login attempts or unusual device behavior. Additionally, organizations should review and tighten access controls on management interfaces, disabling remote management if not required. For new deployments, prefer devices with robust credential management and security features. Finally, maintain close communication with ZTE and security advisories for updates or exploit reports.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-07-24T01:08:25.953Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 688b0383ad5a09ad00b38618
Added to database: 7/31/2025, 5:47:47 AM
Last enriched: 7/31/2025, 6:02:44 AM
Last updated: 8/1/2025, 2:02:46 AM
Views: 17
Related Threats
CVE-2025-5954: CWE-269 Improper Privilege Management in aonetheme Service Finder SMS System
CriticalCVE-2025-8431: SQL Injection in PHPGurukul Boat Booking System
MediumCVE-2025-23289: CWE-532 Insertion of Sensitive Information into Log File in NVIDIA NVIDIA Omniverse Launcher
MediumCVE-2025-48073: CWE-476: NULL Pointer Dereference in AcademySoftwareFoundation openexr
MediumCVE-2025-48072: CWE-125: Out-of-bounds Read in AcademySoftwareFoundation openexr
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.