CVE-2025-9091: Hard-coded Credentials in Tenda AC20
A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-9091 is a vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The flaw involves hard-coded credentials embedded within an unknown functionality related to the file /etc_ro/shadow. This file typically contains password hashes or authentication data in Unix-like systems, and the presence of hard-coded credentials implies that attackers with local access to the device could potentially authenticate using these fixed credentials. The attack vector requires local host access, meaning an attacker must already have some level of access to the device or network to exploit this vulnerability. The complexity of exploitation is rated as high, indicating that it is not trivial to execute the attack, and no user interaction is needed. The CVSS 4.0 base score is 2, which is low severity, reflecting limited impact and difficulty in exploitation. The vulnerability does not affect confidentiality, integrity, or availability significantly, and it requires at least low privileges on the device to attempt exploitation. No known exploits are currently active in the wild, and no patches have been linked or published yet. The public disclosure of the exploit increases the risk that attackers may attempt to leverage this vulnerability, especially in environments where the Tenda AC20 router is deployed and local access can be gained.
Potential Impact
For European organizations, the impact of this vulnerability is relatively limited due to the low severity and the requirement for local access. However, in environments where Tenda AC20 routers are used, particularly in small to medium enterprises or home office setups, an attacker who gains local network access or physical access to the device could leverage the hard-coded credentials to escalate privileges or maintain persistence. This could lead to unauthorized configuration changes, interception of network traffic, or pivoting to other internal systems. Given the low CVSS score and high exploitation complexity, the risk to large enterprise networks with robust perimeter defenses is minimal. Nonetheless, organizations with remote or distributed offices using these devices should be aware of the potential for lateral movement within their networks if an attacker compromises a local segment. The lack of a patch means the vulnerability remains exploitable until addressed by the vendor, increasing the window of exposure.
Mitigation Recommendations
European organizations should implement network segmentation to limit local access to Tenda AC20 devices, ensuring that only trusted administrators and systems can communicate with the router's management interface. Physical security controls should be enforced to prevent unauthorized physical access to the devices. Monitoring network traffic for unusual authentication attempts or configuration changes on these routers can help detect exploitation attempts. Organizations should consider replacing or upgrading affected devices to newer firmware versions once patches become available or migrating to alternative hardware with better security postures. Additionally, disabling any unnecessary services or management interfaces on the router can reduce the attack surface. Regular audits of device configurations and credentials should be conducted to identify and remediate any use of default or hard-coded credentials.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
Description
A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9091 is a vulnerability identified in the Tenda AC20 router firmware version 16.03.08.12. The flaw involves hard-coded credentials embedded within an unknown functionality related to the file /etc_ro/shadow. This file typically contains password hashes or authentication data in Unix-like systems, and the presence of hard-coded credentials implies that attackers with local access to the device could potentially authenticate using these fixed credentials. The attack vector requires local host access, meaning an attacker must already have some level of access to the device or network to exploit this vulnerability. The complexity of exploitation is rated as high, indicating that it is not trivial to execute the attack, and no user interaction is needed. The CVSS 4.0 base score is 2, which is low severity, reflecting limited impact and difficulty in exploitation. The vulnerability does not affect confidentiality, integrity, or availability significantly, and it requires at least low privileges on the device to attempt exploitation. No known exploits are currently active in the wild, and no patches have been linked or published yet. The public disclosure of the exploit increases the risk that attackers may attempt to leverage this vulnerability, especially in environments where the Tenda AC20 router is deployed and local access can be gained.
Potential Impact
For European organizations, the impact of this vulnerability is relatively limited due to the low severity and the requirement for local access. However, in environments where Tenda AC20 routers are used, particularly in small to medium enterprises or home office setups, an attacker who gains local network access or physical access to the device could leverage the hard-coded credentials to escalate privileges or maintain persistence. This could lead to unauthorized configuration changes, interception of network traffic, or pivoting to other internal systems. Given the low CVSS score and high exploitation complexity, the risk to large enterprise networks with robust perimeter defenses is minimal. Nonetheless, organizations with remote or distributed offices using these devices should be aware of the potential for lateral movement within their networks if an attacker compromises a local segment. The lack of a patch means the vulnerability remains exploitable until addressed by the vendor, increasing the window of exposure.
Mitigation Recommendations
European organizations should implement network segmentation to limit local access to Tenda AC20 devices, ensuring that only trusted administrators and systems can communicate with the router's management interface. Physical security controls should be enforced to prevent unauthorized physical access to the devices. Monitoring network traffic for unusual authentication attempts or configuration changes on these routers can help detect exploitation attempts. Organizations should consider replacing or upgrading affected devices to newer firmware versions once patches become available or migrating to alternative hardware with better security postures. Additionally, disabling any unnecessary services or management interfaces on the router can reduce the attack surface. Regular audits of device configurations and credentials should be conducted to identify and remediate any use of default or hard-coded credentials.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-16T06:06:25.733Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a142cead5a09ad0088a3a7
Added to database: 8/17/2025, 2:47:42 AM
Last enriched: 8/25/2025, 1:15:26 AM
Last updated: 1/7/2026, 8:50:41 AM
Views: 138
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.