Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13232 | Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address. |
Tue, 27 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda rx2 Pro Tenda rx2 Pro Firmware |
|
| CPEs | cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda rx2 Pro Tenda rx2 Pro Firmware |
Fri, 02 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-922 | |
| Metrics |
cvssV3_1
|
Thu, 01 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-02T15:15:49.737Z
Reserved: 2025-04-26T00:00:00.000Z
Link: CVE-2025-46627
Updated: 2025-05-02T15:15:43.637Z
Status : Analyzed
Published: 2025-05-01T20:15:38.350
Modified: 2025-05-27T14:23:32.547
Link: CVE-2025-46627
No data.
OpenCVE Enrichment
No data.
EUVD