Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access
References
| Link | Resource |
|---|---|
| https://cybermaya.in/posts/Post-39/ | Exploit Third Party Advisory |
| https://www.tendacn.com/product/download/cp3pro.html | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-14 18:15
Updated : 2025-08-02 01:36
NVD link : CVE-2025-52363
Mitre link : CVE-2025-52363
CVE.ORG link : CVE-2025-52363
JSON object : View
Products Affected
tenda
- cp3_pro_firmware
- cp3_pro
CWE
CWE-798
Use of Hard-coded Credentials
