CVE-2025-8759
BaseFortify
Publication date: 2025-08-09
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| trendnet | tn-200_firmware | 1.02 |
| trendnet | tn-200 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-320 | Key Management Errors |
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the TRENDnet TN-200 NAS device (version 1.02b02) involves a hard-coded cryptographic key in the Lighttpd web server configuration. Specifically, the argument 'secdownload.secret' is set to a fixed secret value 'neV3rUseMe'. Because this secret is hard-coded and publicly known, attackers can remotely exploit it by forging valid secure download URLs, bypassing access controls and gaining unauthorized access to protected files on the device. [1, 2]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized remote access to confidential files stored on the TRENDnet TN-200 NAS device by allowing attackers to generate valid secure download links using the hard-coded secret. This compromises the confidentiality of the data on the device. Although exploitation is considered difficult and requires some effort, a public proof-of-concept exploit exists, increasing the risk of attack. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can focus on identifying the presence of the vulnerable TRENDnet TN-200 device running Lighttpd version 1.02b02 and attempts to use the hardcoded secret 'neV3rUseMe' in the 'secdownload.secret' argument. Network monitoring tools can be used to detect HTTP requests containing this parameter with the known hardcoded value. For example, using tcpdump or Wireshark to filter HTTP traffic for 'secdownload.secret=neV3rUseMe'. A sample tcpdump command could be: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'secdownload.secret=neV3rUseMe'. Additionally, scanning the network for devices with the specific firmware version or Lighttpd version may help identify vulnerable systems. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the affected TRENDnet TN-200 device with an alternative product, as no known countermeasures or patches are currently available. Restricting network access to the device, especially blocking external HTTP access, can reduce exposure. Monitoring for suspicious requests exploiting the hardcoded secret and disabling or isolating the vulnerable Lighttpd service if possible are also recommended. Since the vendor has not provided a response or patch, migration away from the vulnerable device is the advised course of action. [2]