CVE-2025-46628

Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*

History

27 May 2025, 14:24

Type Values Removed Values Added
References () https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46628-command-injection-through-ifconfig-command-in-ate - () https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46628-command-injection-through-ifconfig-command-in-ate - Third Party Advisory, Exploit
References () https://www.tendacn.com/us/default.html - () https://www.tendacn.com/us/default.html - Product
First Time Tenda
Tenda rx2 Pro Firmware
Tenda rx2 Pro
CPE cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*

02 May 2025, 16:15

Type Values Removed Values Added
CWE CWE-284
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

02 May 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) La falta de validación/depuración de entrada en el servicio de gestión "ate" del Tenda RX2 Pro 16.03.30.14 permite que un atacante remoto no autorizado obtenga acceso root al dispositivo mediante el envío de un paquete UDP manipulado al servicio "ate" cuando este está habilitado. No se requiere autenticación.

01 May 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 20:15

Updated : 2025-05-27 14:24


NVD link : CVE-2025-46628

Mitre link : CVE-2025-46628

CVE.ORG link : CVE-2025-46628


JSON object : View

Products Affected

tenda

  • rx2_pro_firmware
  • rx2_pro
CWE
CWE-284

Improper Access Control