Home

Description

EN DE

A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.

Es wurde eine Schwachstelle in Tenda RP3 Pro up to 22.5.7.93 entdeckt. Betroffen davon ist eine unbekannte Funktion der Datei force_upgrade.sh der Komponente Firmware Update Handler. Durch das Beeinflussen des Arguments current_force_upgrade_pwd mit unbekannten Daten kann eine use of hard-coded password-Schwachstelle ausgenutzt werden. Der Angriff muss lokal durchgeführt werden. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-10-12 | Published 2025-10-13 | Updated 2025-10-14 | Assigner VulDB




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.7CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
MEDIUM: 6.7CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
6.5AV:L/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Use of Hard-coded Password

Credentials Management

Product status

22.5.7.0
affected

22.5.7.1
affected

22.5.7.2
affected

22.5.7.3
affected

22.5.7.4
affected

22.5.7.5
affected

22.5.7.6
affected

22.5.7.7
affected

22.5.7.8
affected

22.5.7.9
affected

22.5.7.10
affected

22.5.7.11
affected

22.5.7.12
affected

22.5.7.13
affected

22.5.7.14
affected

22.5.7.15
affected

22.5.7.16
affected

22.5.7.17
affected

22.5.7.18
affected

22.5.7.19
affected

22.5.7.20
affected

22.5.7.21
affected

22.5.7.22
affected

22.5.7.23
affected

22.5.7.24
affected

22.5.7.25
affected

22.5.7.26
affected

22.5.7.27
affected

22.5.7.28
affected

22.5.7.29
affected

22.5.7.30
affected

22.5.7.31
affected

22.5.7.32
affected

22.5.7.33
affected

22.5.7.34
affected

22.5.7.35
affected

22.5.7.36
affected

22.5.7.37
affected

22.5.7.38
affected

22.5.7.39
affected

22.5.7.40
affected

22.5.7.41
affected

22.5.7.42
affected

22.5.7.43
affected

22.5.7.44
affected

22.5.7.45
affected

22.5.7.46
affected

22.5.7.47
affected

22.5.7.48
affected

22.5.7.49
affected

22.5.7.50
affected

22.5.7.51
affected

22.5.7.52
affected

22.5.7.53
affected

22.5.7.54
affected

22.5.7.55
affected

22.5.7.56
affected

22.5.7.57
affected

22.5.7.58
affected

22.5.7.59
affected

22.5.7.60
affected

22.5.7.61
affected

22.5.7.62
affected

22.5.7.63
affected

22.5.7.64
affected

22.5.7.65
affected

22.5.7.66
affected

22.5.7.67
affected

22.5.7.68
affected

22.5.7.69
affected

22.5.7.70
affected

22.5.7.71
affected

22.5.7.72
affected

22.5.7.73
affected

22.5.7.74
affected

22.5.7.75
affected

22.5.7.76
affected

22.5.7.77
affected

22.5.7.78
affected

22.5.7.79
affected

22.5.7.80
affected

22.5.7.81
affected

22.5.7.82
affected

22.5.7.83
affected

22.5.7.84
affected

22.5.7.85
affected

22.5.7.86
affected

22.5.7.87
affected

22.5.7.88
affected

22.5.7.89
affected

22.5.7.90
affected

22.5.7.91
affected

22.5.7.92
affected

22.5.7.93
affected

Timeline

2025-10-12:Advisory disclosed
2025-10-12:VulDB entry created
2025-10-12:VulDB entry last update

Credits

IOT_Res (VulDB User) reporter

References

vuldb.com/?id.328085 (VDB-328085 | Tenda RP3 Pro Firmware Update force_upgrade.sh hard-coded password) vdb-entry technical-description

vuldb.com/?ctiid.328085 (VDB-328085 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.673128 (Submit #673128 | Tenda RP3 Pro V22.5.7.93 CWE-287 Improper Authentication) third-party-advisory

github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md exploit patch

www.tenda.com.cn/ product

cve.org (CVE-2025-11666)

nvd.nist.gov (CVE-2025-11666)

Download JSON