CVE-2025-3461
BaseFortify
Publication date: 2025-06-08
Last updated on: 2026-01-13
Assigner: Austin Hackers Anonymous
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| onsemi | qhs710_firmware | * |
| onsemi | qhs710 | * |
| onsemi | qsr10ga_firmware | * |
| onsemi | qsr10ga | * |
| onsemi | qsr10gu_firmware | * |
| onsemi | qsr10gu | * |
| onsemi | qv840_firmware | * |
| onsemi | qv840 | * |
| onsemi | qv840c_firmware | * |
| onsemi | qv840c | * |
| onsemi | qv860_firmware | * |
| onsemi | qv860 | * |
| onsemi | qv940_firmware | * |
| onsemi | qv940 | * |
| onsemi | qv942c_firmware | * |
| onsemi | qv942c | * |
| onsemi | qv952c_firmware | * |
| onsemi | qv952c | * |
| onsemi | qcs-ax2-s5_firmware | * |
| onsemi | qcs-ax2-s5 | * |
| onsemi | qcs-ax3-a12_firmware | * |
| onsemi | qcs-ax3-a12 | * |
| onsemi | qcs-ax3-t12_firmware | * |
| onsemi | qcs-ax3-t12 | * |
| onsemi | qcs-ax3-t8_firmware | * |
| onsemi | qcs-ax3-t8 | * |
| onsemi | qcs-ax3-s5_firmware | * |
| onsemi | qcs-ax3-s5 | * |
| onsemi | qcs-ax2-a12_firmware | * |
| onsemi | qcs-ax2-a12 | * |
| onsemi | qcs-ax2-t12_firmware | * |
| onsemi | qcs-ax2-t12 | * |
| onsemi | qcs-ax2-t8_firmware | * |
| onsemi | qcs-ax2-t8 | * |
| onsemi | qd840_firmware | * |
| onsemi | qd840 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves Quantenna Wi-Fi chips that have an unauthenticated telnet interface enabled by default. This means that anyone can access the telnet interface without needing to provide credentials, which is a missing authentication for a critical function (CWE-306).
How can this vulnerability impact me? :
Because the telnet interface is unauthenticated, an attacker can remotely access and control the affected Wi-Fi chipset without authorization. This can lead to a complete compromise of confidentiality and integrity of the device, allowing attackers to intercept data or manipulate device functions.