CVE-2025-46625

Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*

History

27 May 2025, 14:22

Type Values Removed Values Added
CPE cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
First Time Tenda rx2 Pro Firmware
Tenda
Tenda rx2 Pro
References () https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46625-command-injection-through-setlancfg-in-httpd - () https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46625-command-injection-through-setlancfg-in-httpd - Third Party Advisory
References () https://www.tendacn.com/us/default.html - () https://www.tendacn.com/us/default.html - Product

01 May 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 20:15

Updated : 2025-05-27 14:22


NVD link : CVE-2025-46625

Mitre link : CVE-2025-46625


JSON object : View

Products Affected

tenda

  • rx2_pro_firmware
  • rx2_pro
CWE

No CWE.