CVE-2025-52363

Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access
References
Link Resource
https://cybermaya.in/posts/Post-39/ Exploit Third Party Advisory
https://www.tendacn.com/product/download/cp3pro.html Broken Link
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:cp3_pro_firmware:22.5.4.93:*:*:*:*:*:*:*
cpe:2.3:h:tenda:cp3_pro:-:*:*:*:*:*:*:*

History

02 Aug 2025, 01:36

Type Values Removed Values Added
First Time Tenda cp3 Pro Firmware
Tenda
Tenda cp3 Pro
References () https://cybermaya.in/posts/Post-39/ - () https://cybermaya.in/posts/Post-39/ - Exploit, Third Party Advisory
References () https://www.tendacn.com/product/download/cp3pro.html - () https://www.tendacn.com/product/download/cp3pro.html - Broken Link
CPE cpe:2.3:o:tenda:cp3_pro_firmware:22.5.4.93:*:*:*:*:*:*:*
cpe:2.3:h:tenda:cp3_pro:-:*:*:*:*:*:*:*

14 Jul 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-14 18:15

Updated : 2025-08-02 01:36


NVD link : CVE-2025-52363

Mitre link : CVE-2025-52363

CVE.ORG link : CVE-2025-52363


JSON object : View

Products Affected

tenda

  • cp3_pro_firmware
  • cp3_pro
CWE
CWE-798

Use of Hard-coded Credentials