Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9725: Use of Hard-coded Password in Cudy LT500E

0
Low
VulnerabilityCVE-2025-9725cvecve-2025-9725
Published: Sun Aug 31 2025 (08/31/2025, 10:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Cudy
Product: LT500E

Description

A vulnerability was identified in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password. The attack must be carried out locally. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit is publicly available and might be used. Upgrading to version 2.3.13 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[T]he firmware does store a default password of 'admin'. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page."

AI-Powered Analysis

AILast updated: 09/08/2025, 00:35:53 UTC

Technical Analysis

CVE-2025-9725 is a vulnerability identified in the Cudy LT500E router firmware versions up to 2.3.12. The issue arises from the presence of a hard-coded default password ('admin') stored within the device's web interface component, specifically in an unknown function related to the /squashfs-root/etc/shadow file. This hard-coded password allows an attacker with local access to the device to potentially authenticate without authorization. The vulnerability requires local access to the device, and the attack complexity is rated as high, indicating that exploitation is not straightforward. The exploitability is difficult, and no user interaction is required once local access is obtained. The vendor has deprecated the use of this default password starting from firmware version 2.3.13, where the device no longer sets an administrator password by default and mandates the creation of a new password of at least 8 characters upon first login to the web management interface. The CVSS 4.0 score is low (2.0), reflecting limited impact and high attack complexity. No known exploits are currently in the wild, but public exploit code exists. The vulnerability primarily affects the confidentiality of the device's management interface, with no direct impact on integrity or availability reported. The scope is limited to local attackers with at least low privileges, and no network-based exploitation is indicated.

Potential Impact

For European organizations, the impact of this vulnerability is generally limited but still significant in certain contexts. Organizations using Cudy LT500E routers in their internal networks could face unauthorized access risks if an attacker gains local access, such as through physical presence or compromised internal systems. This could lead to unauthorized configuration changes, exposure of network management data, or pivoting to other internal systems. However, since exploitation requires local access and has high complexity, the risk of widespread remote attacks is low. The confidentiality of device management credentials is at risk, which could undermine network security controls. In environments with less stringent physical security or where devices are deployed in accessible locations, the threat is more pronounced. European organizations in sectors with high security requirements (e.g., critical infrastructure, finance, healthcare) should be particularly cautious, as unauthorized access to network devices could have cascading effects on operational security and compliance with regulations such as GDPR and NIS Directive.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading all affected Cudy LT500E devices to firmware version 2.3.13 or later, where the hard-coded password is removed and password creation is enforced on first login. Network administrators should conduct an inventory to identify devices running vulnerable firmware versions. Physical security controls should be strengthened to prevent unauthorized local access to network devices. Additionally, organizations should implement network segmentation to isolate management interfaces from general user networks, reducing the risk of local attackers reaching these devices. Enabling logging and monitoring for unusual access attempts to the web management interface can help detect potential exploitation attempts. Where possible, disable or restrict local management access and use secure management protocols. Regularly reviewing and enforcing strong password policies for device management is essential. Finally, organizations should consider deploying endpoint security solutions to detect and prevent lateral movement that could lead to local access on these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-30T13:40:00.256Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b42148ad5a09ad00b97195

Added to database: 8/31/2025, 10:17:44 AM

Last enriched: 9/8/2025, 12:35:53 AM

Last updated: 10/17/2025, 12:22:01 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats