CVE-2025-8731
BaseFortify
Publication date: 2025-08-08
Last updated on: 2025-08-13
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| trendnet | ti-pg102i | v1_1.0.13 |
| trendnet | ti-g160i | v1_1.0.5.s0 |
| trendnet | tpl-430ap | 1.0.1 |
| trendnet | ti-pg102i | v1_1.0.11 |
| trendnet | ti-pg102i | v1_1.0.15 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1392 | The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects TRENDnet devices TI-G160i, TI-PG102i, and TPL-430AP up to the version dated 20250724. It involves the SSH Service component where an attacker can manipulate the system to use default credentials. The attack can be initiated remotely, making it critical and exploitable without user interaction.
How can this vulnerability impact me? :
The vulnerability allows remote attackers to gain unauthorized access to affected devices by exploiting the use of default credentials in the SSH Service. This can lead to full compromise of confidentiality, integrity, and availability of the device and potentially the network it is connected to.