CVE-2025-9309

A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit has been made public and could be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*

History

25 Aug 2025, 02:02

Type Values Removed Values Added
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md - Exploit, Third Party Advisory
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md#steps-to-reproduce - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md#steps-to-reproduce - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.320914 - () https://vuldb.com/?ctiid.320914 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.320914 - () https://vuldb.com/?id.320914 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.633585 - () https://vuldb.com/?submit.633585 - Third Party Advisory, VDB Entry
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
CPE cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*
First Time Tenda ac10
Tenda ac10 Firmware
Tenda

22 Aug 2025, 18:08

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Tenda AC10 16.03.10.13. Se ve afectada una función desconocida del archivo /etc_ro/shadow del componente MD5 Hash Handler. La manipulación da como resultado credenciales codificadas de forma rígida. El ataque debe abordarse localmente. Es un ataque de complejidad bastante alta. Se describe que su explotabilidad es difícil. Se ha hecho público el exploit y puede que sea utilizado.

21 Aug 2025, 18:15

Type Values Removed Values Added
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md -
References () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md#steps-to-reproduce - () https://github.com/XXRicardo/iot-cve/blob/main/Tenda/AC10/V4.0si_V16.03.10.13.md#steps-to-reproduce -

21 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-21 17:15

Updated : 2025-08-25 02:02


NVD link : CVE-2025-9309

Mitre link : CVE-2025-9309

CVE.ORG link : CVE-2025-9309


JSON object : View

Products Affected

tenda

  • ac10
  • ac10_firmware
CWE
CWE-259

Use of Hard-coded Password

CWE-798

Use of Hard-coded Credentials