Skip to main content

CVE-2025-5763: Command Injection in Tenda CP3

Medium
VulnerabilityCVE-2025-5763cvecve-2025-5763
Published: Fri Jun 06 2025 (06/06/2025, 12:00:23 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: CP3

Description

A vulnerability has been found in Tenda CP3 11.10.00.2311090948 and classified as critical. Affected by this vulnerability is the function sub_F3C8C of the file apollo. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 18:42:31 UTC

Technical Analysis

CVE-2025-5763 is a command injection vulnerability identified in the Tenda CP3 device, specifically affecting version 11.10.00.2311090948. The vulnerability resides in the function sub_F3C8C within the apollo file of the device's firmware. Command injection vulnerabilities allow an attacker to execute arbitrary commands on the underlying operating system with the privileges of the vulnerable application. In this case, the vulnerability can be exploited remotely without user interaction, as indicated by the CVSS vector (AV:N/UI:N). However, the attack requires high privileges (PR:H), suggesting that the attacker must already have elevated access or credentials to the device to exploit this flaw. The impact on confidentiality, integrity, and availability is low, but the vulnerability still poses a risk because it allows command execution, which could be leveraged for further attacks or lateral movement within a network. The CVSS 4.0 base score is 5.1, categorized as medium severity. No public exploits are currently known to be actively used in the wild, but the exploit details have been disclosed publicly, increasing the risk of future exploitation. The lack of available patches or mitigation links indicates that users of the affected Tenda CP3 firmware version should be cautious and seek updates or workarounds from the vendor. The vulnerability's presence in a network device such as the Tenda CP3, which is typically used for wireless networking, means that successful exploitation could compromise network infrastructure components, potentially affecting network traffic and connected devices.

Potential Impact

For European organizations, the impact of CVE-2025-5763 depends largely on the deployment of Tenda CP3 devices within their network infrastructure. If these devices are used as part of enterprise or small business network setups, the vulnerability could allow attackers with existing high-level access to execute arbitrary commands, potentially leading to unauthorized configuration changes, data interception, or pivoting to other internal systems. This could degrade network integrity and availability, disrupt business operations, and expose sensitive data. Given the medium severity and the requirement for high privileges, the threat is more significant in environments where device credentials are weak, reused, or compromised. The public disclosure of the exploit details increases the urgency for European organizations to assess their exposure and implement mitigations. Additionally, the vulnerability could be leveraged in targeted attacks against critical infrastructure or sectors with strategic importance in Europe, such as telecommunications or government networks, if Tenda CP3 devices are present.

Mitigation Recommendations

1. Immediate inventory and identification of Tenda CP3 devices running the affected firmware version (11.10.00.2311090948) within the network. 2. Contact Tenda support or check official channels for firmware updates or patches addressing CVE-2025-5763. If no patch is available, consider temporary mitigations such as disabling remote management interfaces or restricting access to trusted IP addresses only. 3. Enforce strong authentication mechanisms and change default or weak credentials on all Tenda CP3 devices to prevent unauthorized high-privilege access. 4. Implement network segmentation to isolate vulnerable devices from critical network segments to limit potential lateral movement. 5. Monitor network traffic and device logs for unusual command execution patterns or unauthorized access attempts. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts targeting Tenda CP3 devices. 7. Educate network administrators about the vulnerability and the importance of timely patching and secure device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-05T22:03:10.316Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6842e15f1a426642debd4c9e

Added to database: 6/6/2025, 12:38:55 PM

Last enriched: 7/7/2025, 6:42:31 PM

Last updated: 8/1/2025, 4:15:38 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats