Tenda RP3 Pro ଯେପର୍ଯ୍ୟନ୍ତ 22.5.7.93 Firmware Update force_upgrade.sh current_force_upgrade_pwd ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu Tenda RP3 Pro ଯେପର୍ଯ୍ୟନ୍ତ 22.5.7.93 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii force_upgrade.sh keessa kutaa Firmware Update Handler keessa. Wanti jijjiirame irratti current_force_upgrade_pwd gara ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-259 si geessa. Odeeffannoon kun yeroo 10/12/2025 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2025-11666 jedhamee waamama. Weerara sun naannoo keessaatti qofa raawwatamuu qaba. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

2 ଆଡାପ୍ଟେସନ୍ · 87 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/12/2025 03:19 PM
ଅଦ୍ୟତନ 1/1
10/13/2025 09:44 AM
software_vendorTendaTenda
software_nameRP3 ProRP3 Pro
software_version<=22.5.7.93<=22.5.7.93
software_componentFirmware Update HandlerFirmware Update Handler
software_fileforce_upgrade.shforce_upgrade.sh
software_argumentcurrent_force_upgrade_pwdcurrent_force_upgrade_pwd
vulnerability_cweCWE-259 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)CWE-259 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ)
vulnerability_risk22
cvss3_vuldb_avLL
cvss3_vuldb_acLL
cvss3_vuldb_prHH
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cHH
cvss3_vuldb_iHH
cvss3_vuldb_aHH
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.mdhttps://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.mdhttps://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md
source_cveCVE-2025-11666CVE-2025-11666
cna_responsibleVulDBVulDB
software_typeRouter Operating SystemRouter Operating System
cvss2_vuldb_avLL
cvss2_vuldb_acLL
cvss2_vuldb_auMM
cvss2_vuldb_ciCC
cvss2_vuldb_iiCC
cvss2_vuldb_aiCC
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avLL
cvss4_vuldb_acLL
cvss4_vuldb_prHH
cvss4_vuldb_uiNN
cvss4_vuldb_vcHH
cvss4_vuldb_viHH
cvss4_vuldb_vaHH
cvss4_vuldb_ePP
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.65.6
cvss3_vuldb_basescore6.76.7
cvss3_vuldb_tempscore6.16.1
cvss3_meta_basescore6.76.7
cvss3_meta_tempscore6.16.4
cvss4_vuldb_bscore8.48.4
cvss4_vuldb_btscore7.07.0
advisory_date1760220000 (10/12/2025)1760220000 (10/12/2025)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.
cvss4_cna_avL
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prH
cvss4_cna_uiN
cvss4_cna_vcH
cvss4_cna_viH
cvss4_cna_vaH
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore8.4
cvss3_cna_avL
cvss3_cna_acL
cvss3_cna_prH
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cvss3_cna_basescore6.7
cvss2_cna_avL
cvss2_cna_acL
cvss2_cna_auM
cvss2_cna_ciC
cvss2_cna_iiC
cvss2_cna_aiC
cvss2_cna_basescore6.5

Do you need the next level of professionalism?

Upgrade your account now!