CVE-2025-9309: Hard-coded Credentials in Tenda AC10
A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-9309 is a vulnerability identified in the Tenda AC10 router firmware version 16.03.10.13. The flaw involves hard-coded credentials embedded within an unknown function related to the /etc_ro/shadow file, specifically within the component handling MD5 hashes. This vulnerability allows an attacker with local access to the device to potentially leverage these hard-coded credentials to gain unauthorized access or escalate privileges. The attack complexity is high, requiring local access and advanced manipulation skills, and no user interaction is needed. The exploitability is considered difficult, and while an exploit has been publicly disclosed, there are no known exploits actively used in the wild. The CVSS 4.0 base score is 2, indicating a low severity primarily due to the requirement for local access, high attack complexity, and limited impact on confidentiality, integrity, and availability. The vulnerability does not require authentication but does require local access, limiting the attack surface to individuals who can physically or logically access the device's local environment. The hard-coded credentials pose a risk of unauthorized access if an attacker can reach the device locally, potentially compromising device configuration or network security.
Potential Impact
For European organizations, the impact of CVE-2025-9309 is relatively limited due to the low severity and the requirement for local access. However, in environments where Tenda AC10 routers are deployed in sensitive or critical network segments, such as small office/home office (SOHO) setups or branch offices, an attacker with physical or local network access could exploit this vulnerability to gain unauthorized control over the device. This could lead to network misconfigurations, interception of network traffic, or pivoting to other internal systems. The risk is higher in organizations with less stringent physical security or where remote local access (e.g., via compromised internal hosts) is possible. Given the low CVSS score and lack of known active exploitation, the immediate threat is low, but the presence of hard-coded credentials is a poor security practice that could be leveraged in targeted attacks or combined with other vulnerabilities to escalate impact.
Mitigation Recommendations
To mitigate this vulnerability, European organizations using Tenda AC10 routers should: 1) Immediately check for firmware updates or patches from Tenda addressing this issue; if none are available, consider contacting the vendor for guidance or timelines. 2) Restrict physical and local network access to devices, ensuring only authorized personnel can connect directly to the router. 3) Implement network segmentation to isolate vulnerable devices from critical network assets, reducing the risk of lateral movement. 4) Monitor network traffic and device logs for unusual access patterns or authentication attempts that could indicate exploitation attempts. 5) Where feasible, replace affected devices with models that do not contain hard-coded credentials or have better security postures. 6) Employ strong network access controls and endpoint security to prevent attackers from gaining local access to the device environment. These steps go beyond generic advice by focusing on access control, network architecture, and vendor engagement specific to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-9309: Hard-coded Credentials in Tenda AC10
Description
A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9309 is a vulnerability identified in the Tenda AC10 router firmware version 16.03.10.13. The flaw involves hard-coded credentials embedded within an unknown function related to the /etc_ro/shadow file, specifically within the component handling MD5 hashes. This vulnerability allows an attacker with local access to the device to potentially leverage these hard-coded credentials to gain unauthorized access or escalate privileges. The attack complexity is high, requiring local access and advanced manipulation skills, and no user interaction is needed. The exploitability is considered difficult, and while an exploit has been publicly disclosed, there are no known exploits actively used in the wild. The CVSS 4.0 base score is 2, indicating a low severity primarily due to the requirement for local access, high attack complexity, and limited impact on confidentiality, integrity, and availability. The vulnerability does not require authentication but does require local access, limiting the attack surface to individuals who can physically or logically access the device's local environment. The hard-coded credentials pose a risk of unauthorized access if an attacker can reach the device locally, potentially compromising device configuration or network security.
Potential Impact
For European organizations, the impact of CVE-2025-9309 is relatively limited due to the low severity and the requirement for local access. However, in environments where Tenda AC10 routers are deployed in sensitive or critical network segments, such as small office/home office (SOHO) setups or branch offices, an attacker with physical or local network access could exploit this vulnerability to gain unauthorized control over the device. This could lead to network misconfigurations, interception of network traffic, or pivoting to other internal systems. The risk is higher in organizations with less stringent physical security or where remote local access (e.g., via compromised internal hosts) is possible. Given the low CVSS score and lack of known active exploitation, the immediate threat is low, but the presence of hard-coded credentials is a poor security practice that could be leveraged in targeted attacks or combined with other vulnerabilities to escalate impact.
Mitigation Recommendations
To mitigate this vulnerability, European organizations using Tenda AC10 routers should: 1) Immediately check for firmware updates or patches from Tenda addressing this issue; if none are available, consider contacting the vendor for guidance or timelines. 2) Restrict physical and local network access to devices, ensuring only authorized personnel can connect directly to the router. 3) Implement network segmentation to isolate vulnerable devices from critical network assets, reducing the risk of lateral movement. 4) Monitor network traffic and device logs for unusual access patterns or authentication attempts that could indicate exploitation attempts. 5) Where feasible, replace affected devices with models that do not contain hard-coded credentials or have better security postures. 6) Employ strong network access controls and endpoint security to prevent attackers from gaining local access to the device environment. These steps go beyond generic advice by focusing on access control, network architecture, and vendor engagement specific to this vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-21T06:06:44.302Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a74dc4ad5a09ad0012a5cb
Added to database: 8/21/2025, 4:48:04 PM
Last enriched: 8/21/2025, 5:03:28 PM
Last updated: 8/21/2025, 5:58:13 PM
Views: 3
Related Threats
CVE-2025-38742: CWE-732: Incorrect Permission Assignment for Critical Resource in Dell iDRAC Service Module (iSM)
MediumCVE-2025-38743: CWE-805: Buffer Access with Incorrect Length Value in Dell iDRAC Service Module (iSM)
HighCVE-2025-52351: n/a
HighCVE-2025-52352: n/a
HighCVE-2025-7051: CWE-284 in N-able N-central
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.