Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13234 | Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed. |
Tue, 27 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda rx2 Pro Tenda rx2 Pro Firmware |
|
| CPEs | cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda rx2 Pro Tenda rx2 Pro Firmware |
Fri, 02 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 01 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-02T15:13:51.305Z
Reserved: 2025-04-26T00:00:00.000Z
Link: CVE-2025-46628
Updated: 2025-05-02T15:13:44.207Z
Status : Analyzed
Published: 2025-05-01T20:15:38.510
Modified: 2025-05-27T14:24:08.060
Link: CVE-2025-46628
No data.
OpenCVE Enrichment
No data.
EUVD