CVE-2025-52364
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-09

Last updated on: 2025-08-07

Assigner: MITRE

Description
Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-09
Last Modified
2025-08-07
Generated
2026-05-07
AI Q&A
2025-07-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tenda cp3_pro_firmware 22.5.4.93
tenda cp3_pro *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1391 The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Insecure Permissions issue in Tenda CP3 Pro Firmware V22.5.4.93. It causes the telnet service (telnetd) to start by default at boot through the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device's shell over the network, potentially without authentication if default or weak credentials are used.


How can this vulnerability impact me? :

The vulnerability can allow remote attackers to gain unauthorized access to the device's shell, potentially leading to full control over the device. This can result in unauthorized configuration changes, data theft, or using the device as a foothold for further attacks within the network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if the telnet service (telnetd) is running on the Tenda CP3 Pro device. On the device, you can run commands like 'ps | grep telnetd' to see if the telnet daemon is active. From a network perspective, you can scan the device's IP address for open telnet ports (usually port 23) using tools like 'nmap -p 23 <device_ip>'. If the telnet service is running and accessible, the device may be vulnerable.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling the telnet service if it is not needed, changing default or weak credentials to strong passwords, and restricting network access to the device. You can disable telnet by modifying or removing the initialization script /etc/init.d/eth.sh that starts telnetd at boot. Additionally, consider updating the firmware if a patched version is available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart