Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70798: n/a

0
High
VulnerabilityCVE-2025-70798cvecve-2025-70798
Published: Tue Mar 10 2026 (03/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:06:12 UTC

Technical Analysis

CVE-2025-70798 is a vulnerability identified in the Tenda i24V3.0si router firmware version 3.0.0.5. The issue arises from a hardcoded password embedded within the /etc_ro/shadow file, which is typically used to store hashed passwords for system users. This hardcoded credential allows an attacker to bypass normal authentication mechanisms and log in directly as the root user, granting full administrative privileges. The vulnerability does not require any prior authentication or user interaction, making it highly exploitable by remote or local attackers with access to the device. The CVSS v3.1 score of 8.4 reflects the high impact on confidentiality, integrity, and availability, as an attacker can fully control the device, alter configurations, intercept or redirect traffic, or disrupt network services. Although no public exploits have been reported yet, the presence of a hardcoded root password is a critical security flaw that can be leveraged for persistent unauthorized access. The vulnerability is categorized under CWE-259, indicating the use of hardcoded credentials, a common and dangerous security anti-pattern. The lack of available patches at the time of reporting increases the urgency for affected organizations to implement compensating controls.

Potential Impact

The impact of CVE-2025-70798 is severe for organizations relying on the affected Tenda i24V3.0si firmware. An attacker gaining root access can fully compromise the device, leading to potential interception of sensitive data, manipulation of network traffic, insertion of malicious payloads, and disruption of network availability. This can result in data breaches, loss of network integrity, and denial of service conditions. Since routers often serve as critical network gateways, their compromise can facilitate lateral movement within corporate networks, enabling attackers to target internal systems. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks. The absence of known exploits in the wild currently limits immediate widespread impact, but the risk remains high due to the fundamental nature of the flaw.

Mitigation Recommendations

To mitigate CVE-2025-70798, organizations should first check for any firmware updates or patches released by Tenda addressing this vulnerability and apply them promptly. If no official patch is available, consider replacing affected devices with models not impacted by this issue. Network administrators should implement strict network segmentation to isolate vulnerable devices from critical infrastructure and restrict management interface access to trusted networks only. Employ strong monitoring and logging of device access attempts to detect unauthorized login activities. Disable remote management features if not required, and use VPNs or secure tunnels for any necessary remote access. Additionally, consider deploying network intrusion detection systems (NIDS) to identify suspicious traffic patterns targeting these routers. Finally, maintain an inventory of all network devices to ensure timely identification and remediation of vulnerable hardware.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b082c52f860ef943b7fd3b

Added to database: 3/10/2026, 8:44:53 PM

Last enriched: 3/18/2026, 7:06:12 PM

Last updated: 4/28/2026, 4:10:02 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses