Metrics
Affected Vendors & Products
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda rp3 Pro |
|
| Vendors & Products |
Tenda
Tenda rp3 Pro |
Tue, 14 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Oct 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used. | |
| Title | Tenda RP3 Pro Firmware Update force_upgrade.sh hard-coded password | |
| Weaknesses | CWE-255 CWE-259 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-10-13T07:02:07.269Z
Updated: 2025-10-14T15:03:06.353Z
Reserved: 2025-10-12T13:14:23.093Z
Link: CVE-2025-11666
Updated: 2025-10-14T15:03:02.163Z
Status : Awaiting Analysis
Published: 2025-10-13T07:15:53.063
Modified: 2025-10-14T19:36:59.730
Link: CVE-2025-11666
No data.