Tenda RP3 Pro har 22.5.7.93 Firmware Update force_upgrade.sh current_force_upgrade_pwd karkar ndiyamga taƙa
Hakika vulnerability da aka rarraba a matsayin kura an gano a Tenda RP3 Pro har 22.5.7.93. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil force_upgrade.sh, a cikin sashi Firmware Update Handler. Wuro manipulation of the argument current_force_upgrade_pwd ga karkar ndiyamga taƙa. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-259. Lalle, rauni an sanar da shi 10/12/2025. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-11666. Wuroo ka a yiɗi a yi ɗum e laawol gese. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
2 Goyarwa · 87 Datenpunkte
| Furɗe | Súgá 10/12/2025 15:19 | Gargadi 1/1 10/13/2025 09:44 |
|---|---|---|
| software_vendor | Tenda | Tenda |
| software_name | RP3 Pro | RP3 Pro |
| software_version | <=22.5.7.93 | <=22.5.7.93 |
| software_component | Firmware Update Handler | Firmware Update Handler |
| software_file | force_upgrade.sh | force_upgrade.sh |
| software_argument | current_force_upgrade_pwd | current_force_upgrade_pwd |
| vulnerability_cwe | CWE-259 (karkar ndiyamga taƙa) | CWE-259 (karkar ndiyamga taƙa) |
| vulnerability_risk | 2 | 2 |
| cvss3_vuldb_av | L | L |
| cvss3_vuldb_ac | L | L |
| cvss3_vuldb_pr | H | H |
| cvss3_vuldb_ui | N | N |
| cvss3_vuldb_s | U | U |
| cvss3_vuldb_c | H | H |
| cvss3_vuldb_i | H | H |
| cvss3_vuldb_a | H | H |
| cvss3_vuldb_e | P | P |
| cvss3_vuldb_rc | R | R |
| advisory_url | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md |
| exploit_availability | 1 | 1 |
| exploit_publicity | 1 | 1 |
| exploit_url | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md |
| source_cve | CVE-2025-11666 | CVE-2025-11666 |
| cna_responsible | VulDB | VulDB |
| software_type | Router Operating System | Router Operating System |
| cvss2_vuldb_av | L | L |
| cvss2_vuldb_ac | L | L |
| cvss2_vuldb_au | M | M |
| cvss2_vuldb_ci | C | C |
| cvss2_vuldb_ii | C | C |
| cvss2_vuldb_ai | C | C |
| cvss2_vuldb_e | POC | POC |
| cvss2_vuldb_rc | UR | UR |
| cvss4_vuldb_av | L | L |
| cvss4_vuldb_ac | L | L |
| cvss4_vuldb_pr | H | H |
| cvss4_vuldb_ui | N | N |
| cvss4_vuldb_vc | H | H |
| cvss4_vuldb_vi | H | H |
| cvss4_vuldb_va | H | H |
| cvss4_vuldb_e | P | P |
| cvss2_vuldb_rl | ND | ND |
| cvss3_vuldb_rl | X | X |
| cvss4_vuldb_at | N | N |
| cvss4_vuldb_sc | N | N |
| cvss4_vuldb_si | N | N |
| cvss4_vuldb_sa | N | N |
| cvss2_vuldb_basescore | 6.5 | 6.5 |
| cvss2_vuldb_tempscore | 5.6 | 5.6 |
| cvss3_vuldb_basescore | 6.7 | 6.7 |
| cvss3_vuldb_tempscore | 6.1 | 6.1 |
| cvss3_meta_basescore | 6.7 | 6.7 |
| cvss3_meta_tempscore | 6.1 | 6.4 |
| cvss4_vuldb_bscore | 8.4 | 8.4 |
| cvss4_vuldb_btscore | 7.0 | 7.0 |
| advisory_date | 1760220000 (10/12/2025) | 1760220000 (10/12/2025) |
| price_0day | $0-$5k | $0-$5k |
| cve_nvd_summary | A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used. | |
| cvss4_cna_av | L | |
| cvss4_cna_ac | L | |
| cvss4_cna_at | N | |
| cvss4_cna_pr | H | |
| cvss4_cna_ui | N | |
| cvss4_cna_vc | H | |
| cvss4_cna_vi | H | |
| cvss4_cna_va | H | |
| cvss4_cna_sc | N | |
| cvss4_cna_si | N | |
| cvss4_cna_sa | N | |
| cvss4_cna_bscore | 8.4 | |
| cvss3_cna_av | L | |
| cvss3_cna_ac | L | |
| cvss3_cna_pr | H | |
| cvss3_cna_ui | N | |
| cvss3_cna_s | U | |
| cvss3_cna_c | H | |
| cvss3_cna_i | H | |
| cvss3_cna_a | H | |
| cvss3_cna_basescore | 6.7 | |
| cvss2_cna_av | L | |
| cvss2_cna_ac | L | |
| cvss2_cna_au | M | |
| cvss2_cna_ci | C | |
| cvss2_cna_ii | C | |
| cvss2_cna_ai | C | |
| cvss2_cna_basescore | 6.5 |