CVE-2025-24322
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-11-03
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tenda | ac6_firmware | 02.03.01.110 |
| tenda | ac6 | 5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-304 | The product implements an authentication technique, but it skips a step that weakens the technique. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unsafe default authentication issue in the Initial Setup Authentication functionality of the Tenda AC6 V5.0 V02.03.01.110 device. It allows an attacker to send a specially crafted network request to the device, which can lead to arbitrary code execution. Essentially, an attacker can access the device and execute malicious code without proper authentication.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized access to the device, full compromise of the device through arbitrary code execution, and potential disruption of services. An attacker could take control of the device, steal information, or use it as a foothold for further attacks.