Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access
References
Link | Resource |
---|---|
https://cybermaya.in/posts/Post-39/ | Exploit Third Party Advisory |
https://www.tendacn.com/product/download/cp3pro.html | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Aug 2025, 01:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tenda cp3 Pro Firmware
Tenda Tenda cp3 Pro |
|
References | () https://cybermaya.in/posts/Post-39/ - Exploit, Third Party Advisory | |
References | () https://www.tendacn.com/product/download/cp3pro.html - Broken Link | |
CPE | cpe:2.3:o:tenda:cp3_pro_firmware:22.5.4.93:*:*:*:*:*:*:* cpe:2.3:h:tenda:cp3_pro:-:*:*:*:*:*:*:* |
14 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-14 18:15
Updated : 2025-08-02 01:36
NVD link : CVE-2025-52363
Mitre link : CVE-2025-52363
CVE.ORG link : CVE-2025-52363
JSON object : View
Products Affected
tenda
- cp3_pro_firmware
- cp3_pro
CWE
CWE-798
Use of Hard-coded Credentials