CVE-2025-46628

Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*

History

27 May 2025, 14:24

Type Values Removed Values Added
First Time Tenda rx2 Pro Firmware
Tenda
Tenda rx2 Pro
CPE cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
References () https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46628-command-injection-through-ifconfig-command-in-ate - () https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46628-command-injection-through-ifconfig-command-in-ate - Third Party Advisory, Exploit
References () https://www.tendacn.com/us/default.html - () https://www.tendacn.com/us/default.html - Product

01 May 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 20:15

Updated : 2025-05-27 14:24


NVD link : CVE-2025-46628

Mitre link : CVE-2025-46628


JSON object : View

Products Affected

tenda

  • rx2_pro_firmware
  • rx2_pro
CWE

No CWE.