CVE-2025-8731: Use of Default Credentials in TRENDnet TI-G160i
A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid."
AI Analysis
Technical Summary
CVE-2025-8731 is a critical security vulnerability affecting several TRENDnet network devices, specifically the TI-G160i, TI-PG102i, and TPL-430AP models up to firmware version 20250724. The vulnerability arises from the use of default credentials within the SSH service component of these devices. An attacker can remotely exploit this flaw without requiring authentication or user interaction, due to the presence of default or hardcoded credentials that have not been properly disabled or changed. Although the vendor states that remote management options are disabled by default on the TI-G160i and TI-PG102i models and that the root account password is encrypted, the root account remains present for troubleshooting purposes. The vendor also plans to remove this root account in future firmware releases. For the TPL-430AP, the initial setup process mandates the user to set a password for the management GUI, which invalidates the default password; however, devices that have not completed this setup remain vulnerable. The vulnerability has a high CVSS 4.0 base score of 9.3, reflecting its critical nature, with an attack vector that is network-based, no required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. While public exploit code is not currently confirmed in the wild, the disclosure of the vulnerability increases the risk of exploitation. The vulnerability could allow attackers to gain unauthorized remote access to device management interfaces, potentially leading to full device compromise, network reconnaissance, lateral movement, or disruption of network services.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on TRENDnet TI-G160i, TI-PG102i, or TPL-430AP devices in their network infrastructure. Unauthorized access to these devices could lead to interception or manipulation of network traffic, disruption of critical network services, and potential pivoting to other internal systems. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. The compromise of network devices could also lead to violations of GDPR due to unauthorized data access or breaches. Given the remote exploitability and lack of required authentication, attackers could launch widespread attacks against vulnerable devices, potentially impacting availability and integrity of network operations. The presence of default credentials is a common and easily exploitable weakness, increasing the likelihood of successful attacks. The vendor's indication that the root account will be removed in future updates suggests current devices remain at risk until patched or mitigated. The uncertainty about the real existence of the vulnerability should not delay proactive defensive measures given the critical CVSS rating and potential impact.
Mitigation Recommendations
European organizations should immediately audit their network environments to identify the presence of TRENDnet TI-G160i, TI-PG102i, and TPL-430AP devices running firmware versions up to 20250724. Until a firmware update removing the root account or addressing the default credential issue is available, organizations should disable remote management interfaces, especially SSH access, if not strictly necessary. Network segmentation should be enforced to isolate these devices from critical network segments and restrict access to trusted administrators only. Implement strict access control lists (ACLs) and firewall rules to limit inbound connections to management interfaces. Change any default or factory-set passwords immediately, even if the vendor claims passwords are encrypted, to prevent unauthorized access. Monitor network traffic for unusual SSH connection attempts or brute-force activities targeting these devices. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts. Finally, maintain close communication with TRENDnet for firmware updates and apply patches promptly once released. Consider replacing vulnerable devices if no timely fix is available, especially in high-risk environments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-8731: Use of Default Credentials in TRENDnet TI-G160i
Description
A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid."
AI-Powered Analysis
Technical Analysis
CVE-2025-8731 is a critical security vulnerability affecting several TRENDnet network devices, specifically the TI-G160i, TI-PG102i, and TPL-430AP models up to firmware version 20250724. The vulnerability arises from the use of default credentials within the SSH service component of these devices. An attacker can remotely exploit this flaw without requiring authentication or user interaction, due to the presence of default or hardcoded credentials that have not been properly disabled or changed. Although the vendor states that remote management options are disabled by default on the TI-G160i and TI-PG102i models and that the root account password is encrypted, the root account remains present for troubleshooting purposes. The vendor also plans to remove this root account in future firmware releases. For the TPL-430AP, the initial setup process mandates the user to set a password for the management GUI, which invalidates the default password; however, devices that have not completed this setup remain vulnerable. The vulnerability has a high CVSS 4.0 base score of 9.3, reflecting its critical nature, with an attack vector that is network-based, no required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. While public exploit code is not currently confirmed in the wild, the disclosure of the vulnerability increases the risk of exploitation. The vulnerability could allow attackers to gain unauthorized remote access to device management interfaces, potentially leading to full device compromise, network reconnaissance, lateral movement, or disruption of network services.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on TRENDnet TI-G160i, TI-PG102i, or TPL-430AP devices in their network infrastructure. Unauthorized access to these devices could lead to interception or manipulation of network traffic, disruption of critical network services, and potential pivoting to other internal systems. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. The compromise of network devices could also lead to violations of GDPR due to unauthorized data access or breaches. Given the remote exploitability and lack of required authentication, attackers could launch widespread attacks against vulnerable devices, potentially impacting availability and integrity of network operations. The presence of default credentials is a common and easily exploitable weakness, increasing the likelihood of successful attacks. The vendor's indication that the root account will be removed in future updates suggests current devices remain at risk until patched or mitigated. The uncertainty about the real existence of the vulnerability should not delay proactive defensive measures given the critical CVSS rating and potential impact.
Mitigation Recommendations
European organizations should immediately audit their network environments to identify the presence of TRENDnet TI-G160i, TI-PG102i, and TPL-430AP devices running firmware versions up to 20250724. Until a firmware update removing the root account or addressing the default credential issue is available, organizations should disable remote management interfaces, especially SSH access, if not strictly necessary. Network segmentation should be enforced to isolate these devices from critical network segments and restrict access to trusted administrators only. Implement strict access control lists (ACLs) and firewall rules to limit inbound connections to management interfaces. Change any default or factory-set passwords immediately, even if the vendor claims passwords are encrypted, to prevent unauthorized access. Monitor network traffic for unusual SSH connection attempts or brute-force activities targeting these devices. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts. Finally, maintain close communication with TRENDnet for firmware updates and apply patches promptly once released. Consider replacing vulnerable devices if no timely fix is available, especially in high-risk environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-08T07:45:03.332Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68961c24ad5a09ad0005055c
Added to database: 8/8/2025, 3:47:48 PM
Last enriched: 8/16/2025, 12:59:38 AM
Last updated: 9/20/2025, 4:15:49 PM
Views: 65
Related Threats
CVE-2025-10769: Deserialization in h2oai h2o-3
MediumCVE-2025-10768: Deserialization in h2oai h2o-3
MediumCVE-2025-10766: Path Traversal in SeriaWei ZKEACMS
MediumCVE-2025-10761: Improper Restriction of Excessive Authentication Attempts in Harness
MediumCVE-2025-10760: Server-Side Request Forgery in Harness
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.