CVE-2025-52364
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-08-07
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | cp3_pro_firmware | 22.5.4.93 |
| tenda | cp3_pro | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1391 | The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Insecure Permissions issue in Tenda CP3 Pro Firmware V22.5.4.93. It causes the telnet service (telnetd) to start by default at boot through the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device's shell over the network, potentially without authentication if default or weak credentials are used.
How can this vulnerability impact me? :
The vulnerability can allow remote attackers to gain unauthorized access to the device's shell, potentially leading to full control over the device. This can result in unauthorized configuration changes, data theft, or using the device as a foothold for further attacks within the network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the telnet service (telnetd) is running on the Tenda CP3 Pro device. On the device, you can run commands like 'ps | grep telnetd' to see if the telnet daemon is active. From a network perspective, you can scan the device's IP address for open telnet ports (usually port 23) using tools like 'nmap -p 23 <device_ip>'. If the telnet service is running and accessible, the device may be vulnerable.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling the telnet service if it is not needed, changing default or weak credentials to strong passwords, and restricting network access to the device. You can disable telnet by modifying or removing the initialization script /etc/init.d/eth.sh that starts telnetd at boot. Additionally, consider updating the firmware if a patched version is available.