CVE-2025-8731: Use of Default Credentials in TRENDnet TI-G160i
A vulnerability was found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. It has been classified as critical. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8731 is a critical vulnerability affecting several TRENDnet network devices, specifically the TI-G160i, TI-PG102i, and TPL-430AP models up to firmware version 20250724. The vulnerability resides in the SSH service component of these devices, where an attacker can remotely exploit the use of default credentials. This means that the devices are configured with factory default usernames and passwords that have not been changed or properly secured, allowing unauthorized remote access via SSH without any authentication barriers. The vulnerability is remotely exploitable without requiring any user interaction or prior authentication, making it highly accessible to attackers. The vendor was notified early but has not responded or provided a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 base score is 9.3, indicating a critical severity level due to the combination of network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The lack of vendor response and absence of patches further exacerbate the risk. This vulnerability could allow attackers to gain full control over affected devices, potentially leading to network compromise, data interception, lateral movement, or use of the devices as pivot points for further attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on TRENDnet TI-G160i, TI-PG102i, and TPL-430AP devices in their network infrastructure. Compromise of these devices could lead to unauthorized access to internal networks, interception of sensitive communications, disruption of network services, and potential data breaches. Critical infrastructure operators, enterprises, and government agencies using these devices could face operational disruptions and reputational damage. The ability to remotely exploit the vulnerability without authentication means attackers can quickly gain footholds in networks, increasing the likelihood of widespread compromise. Given the public disclosure and lack of vendor patch, European organizations must assume active exploitation attempts are likely or imminent, increasing urgency for mitigation. The impact extends beyond individual organizations as compromised devices could be leveraged in botnets or for launching attacks against other targets within Europe.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should take immediate practical steps to mitigate risk: 1) Identify and inventory all affected TRENDnet devices in the network. 2) Change all default credentials on these devices immediately to strong, unique passwords. 3) If possible, disable SSH access or restrict it to trusted management networks or VPNs to reduce exposure. 4) Implement network segmentation to isolate vulnerable devices from critical assets. 5) Monitor network traffic for unusual SSH connection attempts or unauthorized access patterns. 6) Consider replacing affected devices with alternative hardware from vendors with active security support if mitigation is not feasible. 7) Apply strict access control policies and multi-factor authentication on management interfaces where supported. 8) Maintain up-to-date network device inventories and enforce secure configuration baselines to prevent default credential usage in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-8731: Use of Default Credentials in TRENDnet TI-G160i
Description
A vulnerability was found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. It has been classified as critical. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8731 is a critical vulnerability affecting several TRENDnet network devices, specifically the TI-G160i, TI-PG102i, and TPL-430AP models up to firmware version 20250724. The vulnerability resides in the SSH service component of these devices, where an attacker can remotely exploit the use of default credentials. This means that the devices are configured with factory default usernames and passwords that have not been changed or properly secured, allowing unauthorized remote access via SSH without any authentication barriers. The vulnerability is remotely exploitable without requiring any user interaction or prior authentication, making it highly accessible to attackers. The vendor was notified early but has not responded or provided a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 base score is 9.3, indicating a critical severity level due to the combination of network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The lack of vendor response and absence of patches further exacerbate the risk. This vulnerability could allow attackers to gain full control over affected devices, potentially leading to network compromise, data interception, lateral movement, or use of the devices as pivot points for further attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on TRENDnet TI-G160i, TI-PG102i, and TPL-430AP devices in their network infrastructure. Compromise of these devices could lead to unauthorized access to internal networks, interception of sensitive communications, disruption of network services, and potential data breaches. Critical infrastructure operators, enterprises, and government agencies using these devices could face operational disruptions and reputational damage. The ability to remotely exploit the vulnerability without authentication means attackers can quickly gain footholds in networks, increasing the likelihood of widespread compromise. Given the public disclosure and lack of vendor patch, European organizations must assume active exploitation attempts are likely or imminent, increasing urgency for mitigation. The impact extends beyond individual organizations as compromised devices could be leveraged in botnets or for launching attacks against other targets within Europe.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should take immediate practical steps to mitigate risk: 1) Identify and inventory all affected TRENDnet devices in the network. 2) Change all default credentials on these devices immediately to strong, unique passwords. 3) If possible, disable SSH access or restrict it to trusted management networks or VPNs to reduce exposure. 4) Implement network segmentation to isolate vulnerable devices from critical assets. 5) Monitor network traffic for unusual SSH connection attempts or unauthorized access patterns. 6) Consider replacing affected devices with alternative hardware from vendors with active security support if mitigation is not feasible. 7) Apply strict access control policies and multi-factor authentication on management interfaces where supported. 8) Maintain up-to-date network device inventories and enforce secure configuration baselines to prevent default credential usage in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-08T07:45:03.332Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68961c24ad5a09ad0005055c
Added to database: 8/8/2025, 3:47:48 PM
Last enriched: 8/8/2025, 4:02:54 PM
Last updated: 8/9/2025, 12:53:26 PM
Views: 14
Related Threats
CVE-2025-8757: Least Privilege Violation in TRENDnet TV-IP110WN
HighCVE-2025-8756: Improper Authorization in TDuckCloud tduck-platform
MediumCVE-2025-7726: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dream-Theme The7 — Website and eCommerce Builder for WordPress
MediumCVE-2025-8753: Path Traversal in linlinjava litemall
MediumCVE-2025-7020: CWE-656: Incorrect Encryption Implementation in BYD DiLink OS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.