CVE-2025-8182
BaseFortify
Publication date: 2025-07-26
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | ac18_firmware | 15.03.05.19 |
| tenda | ac18 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-521 | The product does not require that users should have strong passwords. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-8182 is a vulnerability in the Tenda AC18 router firmware version 15.03.05.19, specifically in the Samba configuration file (/etc_ro/smb.conf). The vulnerability is caused by weak password enforcement that allows null passwords, enabling remote attackers to access Samba shared resources without authentication. This misconfiguration can lead to unauthorized access to shared files and directories. [1, 2]
How can this vulnerability impact me? :
This vulnerability can allow remote attackers to gain unauthorized access to shared files and directories on the affected Tenda AC18 router. This can lead to information disclosure, unauthorized data manipulation, and compromise of the confidentiality, integrity, and availability of the system. Although exploitation is considered difficult, a proof-of-concept exploit is publicly available. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the Samba configuration file (/etc_ro/smb.conf) on the Tenda AC18 router firmware version 15.03.05.19 for weak password enforcement or null password settings. Since the vulnerability allows access without authentication if the account has a null password, you can attempt to connect to Samba shares remotely without credentials to test if null password access is allowed. Specific commands to test this could include using smbclient to connect without a password, for example: smbclient -L //<router_ip> -N (where -N means no password). Additionally, scanning the network for Samba shares on the affected device and attempting anonymous access can help detect the vulnerability. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling Samba sharing on the affected Tenda AC18 router if possible, or restricting access to the Samba service to trusted networks only. Since no official vendor patch or fix has been reported, it is recommended to replace the affected product with an alternative device that does not have this vulnerability. Additionally, ensure that no accounts have null or empty passwords configured in the Samba settings to prevent unauthorized access. [2, 1]