Skip to main content

CVE-2025-53558: Use of weak credentials in ZTE Japan. K.K. ZXHN-F660T

High
VulnerabilityCVE-2025-53558cvecve-2025-53558
Published: Thu Jul 31 2025 (07/31/2025, 05:44:25 UTC)
Source: CVE Database V5
Vendor/Project: ZTE Japan. K.K.
Product: ZXHN-F660T

Description

ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.

AI-Powered Analysis

AILast updated: 07/31/2025, 06:02:44 UTC

Technical Analysis

CVE-2025-53558 is a high-severity vulnerability affecting the ZTE Japan K.K. ZXHN-F660T and ZXHN-F660A devices, specifically versions prior to V1.0.10P17N4. The core issue is the use of a common, hardcoded credential across all installations of these devices. This means that an attacker who knows this credential can gain unauthorized access to the device without any need for user interaction or prior authentication. The vulnerability has a CVSS 3.0 base score of 8.8, reflecting its critical impact on confidentiality, integrity, and availability. The attack vector is adjacent network (AV:A), implying that the attacker must be on the same local network or connected via a network segment that can reach the device. However, the attack complexity is low (AC:L), and no privileges or user interaction are required (PR:N, UI:N). Successful exploitation allows full compromise of the device, potentially enabling attackers to intercept, manipulate, or disrupt network traffic, alter device configurations, or use the device as a pivot point for further attacks. Although no known exploits are currently reported in the wild, the simplicity of exploitation and the widespread use of these devices in certain markets make this a significant threat. The vulnerability stems from poor credential management practices, which is a common security oversight in embedded network devices.

Potential Impact

For European organizations, especially those using ZTE networking equipment or devices supplied by ZTE Japan K.K., this vulnerability poses a serious risk. Compromise of these devices can lead to unauthorized network access, data interception, and potential lateral movement within corporate networks. This can result in data breaches, disruption of business operations, and exposure of sensitive information. Given the high confidentiality, integrity, and availability impact, critical infrastructure operators, telecommunications providers, and enterprises relying on these devices for network connectivity are at particular risk. The vulnerability could also be exploited to launch further attacks such as man-in-the-middle, denial of service, or as a foothold for ransomware campaigns. The fact that exploitation requires only network adjacency means that attackers who gain access to internal networks, or who can connect via compromised VPNs or Wi-Fi, can leverage this vulnerability. This elevates the threat level for organizations with remote or hybrid work models prevalent in Europe. Additionally, regulatory compliance frameworks such as GDPR impose strict requirements on protecting personal data, and exploitation of this vulnerability could lead to significant legal and financial consequences.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately identify any ZXHN-F660T or ZXHN-F660A devices in their network inventory and verify their firmware versions. Devices running versions prior to V1.0.10P17N4 must be upgraded to the latest firmware that addresses this issue. If an official patch is not yet available, organizations should implement compensating controls such as network segmentation to isolate these devices from critical systems and restrict access to trusted administrators only. Changing default or common credentials is essential; if the device allows credential customization, enforce strong, unique passwords per device. Network monitoring should be enhanced to detect unauthorized login attempts or unusual device behavior. Additionally, organizations should review and tighten access controls on management interfaces, disabling remote management if not required. For new deployments, prefer devices with robust credential management and security features. Finally, maintain close communication with ZTE and security advisories for updates or exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-07-24T01:08:25.953Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 688b0383ad5a09ad00b38618

Added to database: 7/31/2025, 5:47:47 AM

Last enriched: 7/31/2025, 6:02:44 AM

Last updated: 8/1/2025, 2:02:46 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats