Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70798: n/a

0
High
VulnerabilityCVE-2025-70798cvecve-2025-70798
Published: Tue Mar 10 2026 (03/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:00:05 UTC

Technical Analysis

CVE-2025-70798 is a critical security vulnerability identified in the Tenda i24V3.0si router firmware version 3.0.0.5. The issue arises from a hardcoded password embedded within the /etc_ro/shadow file, which is used for storing encrypted user credentials on Unix-like systems. Because this password is hardcoded and accessible, an attacker can log in as the root user without needing to authenticate legitimately. Root access on a router provides complete control over the device, enabling attackers to manipulate network traffic, install malicious firmware, exfiltrate sensitive data, or use the device as a pivot point for further network compromise. The vulnerability does not currently have a CVSS score or known exploits in the wild, but the presence of a hardcoded root password inherently represents a severe security risk. The firmware version affected is specifically 3.0.0.5 of the Tenda i24V3.0si model, and no other versions are explicitly mentioned. The vulnerability was reserved in January 2026 and published in March 2026, indicating recent discovery. The lack of available patches or mitigations from the vendor at this time increases the urgency for organizations to take protective measures. The root cause is a design flaw in the firmware's credential management, which violates best practices by embedding static credentials in a system file accessible to attackers.

Potential Impact

The impact of CVE-2025-70798 is significant for organizations using the affected Tenda i24V3.0si routers. Successful exploitation grants attackers root-level access, allowing them to fully control the device and the network traffic passing through it. This can lead to interception and manipulation of sensitive data, disruption of network services, deployment of persistent malware, and lateral movement within corporate networks. The confidentiality, integrity, and availability of network communications are all at risk. Because routers often serve as gateways to internal networks, compromise can extend beyond the device itself to critical infrastructure and connected systems. The ease of exploitation—requiring no authentication or user interaction—makes this vulnerability particularly dangerous. Organizations with remote or internet-exposed routers are at higher risk, as attackers can attempt direct access. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature suggests it could be rapidly weaponized once publicized. Without vendor patches, affected entities face prolonged exposure and must rely on network-level mitigations.

Mitigation Recommendations

To mitigate CVE-2025-70798, organizations should first identify all Tenda i24V3.0si routers running firmware version 3.0.0.5 within their networks. Since no official patches are currently available, immediate steps include isolating these devices from untrusted networks, especially the internet, by implementing strict firewall rules and network segmentation. Change default management ports and disable remote management features if possible. Monitor network traffic for unusual activity indicative of unauthorized access attempts. Consider replacing vulnerable devices with models from vendors that follow secure firmware development practices. If feasible, consult with Tenda support for any unofficial patches or firmware updates addressing this issue. Employ network intrusion detection systems (NIDS) to detect exploitation attempts targeting the hardcoded password. Regularly audit device configurations and access logs to identify potential compromises. Educate IT staff about the risks of hardcoded credentials and the importance of secure device management. Finally, maintain an inventory of all network devices to ensure timely response to future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b082c52f860ef943b7fd3b

Added to database: 3/10/2026, 8:44:53 PM

Last enriched: 3/10/2026, 9:00:05 PM

Last updated: 3/13/2026, 9:01:26 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses