CNVD-2025-09930

Vulnerability from cnvd - Published: 2025-05-15
VLAI Severity ?
Title
Tenda RX2 Pro setLanCfg API端点输入验证错误漏洞
Description
Tenda RX2 Pro是中国腾达(Tenda)公司的一款高性能WiFi 6信号放大器。 Tenda RX2 Pro存在输入验证错误漏洞,该漏洞源于setLanCfg API端点缺少输入验证,攻击者利用该漏洞获取root shell访问权限。
Severity
Patch Name
Tenda RX2 Pro setLanCfg API端点输入验证错误漏洞的补丁
Patch Description
Tenda RX2 Pro是中国腾达(Tenda)公司的一款高性能WiFi 6信号放大器。 Tenda RX2 Pro存在输入验证错误漏洞,该漏洞源于setLanCfg API端点缺少输入验证,攻击者利用该漏洞获取root shell访问权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://www.tendacn.com/us/download/detail-5715.html

Reference
https://nvd.nist.gov/vuln/detail/CVE-2025-46625
Impacted products
Name
Tenda RX2 Pro 16.03.30.14
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2025-46625",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-46625"
    }
  },
  "description": "Tenda RX2 Pro\u662f\u4e2d\u56fd\u817e\u8fbe\uff08Tenda\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9ad8\u6027\u80fdWiFi 6\u4fe1\u53f7\u653e\u5927\u5668\u3002\n\nTenda RX2 Pro\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8esetLanCfg API\u7aef\u70b9\u7f3a\u5c11\u8f93\u5165\u9a8c\u8bc1\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6root shell\u8bbf\u95ee\u6743\u9650\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51\uff1a\r\nhttps://www.tendacn.com/us/download/detail-5715.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2025-09930",
  "openTime": "2025-05-15",
  "patchDescription": "Tenda RX2 Pro\u662f\u4e2d\u56fd\u817e\u8fbe\uff08Tenda\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9ad8\u6027\u80fdWiFi 6\u4fe1\u53f7\u653e\u5927\u5668\u3002\r\n\r\nTenda RX2 Pro\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8esetLanCfg API\u7aef\u70b9\u7f3a\u5c11\u8f93\u5165\u9a8c\u8bc1\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6root shell\u8bbf\u95ee\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Tenda RX2 Pro setLanCfg API\u7aef\u70b9\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Tenda RX2 Pro 16.03.30.14"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-46625",
  "serverity": "\u9ad8",
  "submitTime": "2025-05-14",
  "title": "Tenda RX2 Pro setLanCfg API\u7aef\u70b9\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…