Tenda RP3 Pro ଯେପର୍ଯ୍ୟନ୍ତ 22.5.7.93 Firmware Update force_upgrade.sh current_force_upgrade_pwd ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ
Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu Tenda RP3 Pro ଯେପର୍ଯ୍ୟନ୍ତ 22.5.7.93 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii force_upgrade.sh keessa kutaa Firmware Update Handler keessa. Wanti jijjiirame irratti current_force_upgrade_pwd gara ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-259 si geessa. Odeeffannoon kun yeroo 10/12/2025 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2025-11666 jedhamee waamama. Weerara sun naannoo keessaatti qofa raawwatamuu qaba. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
2 ଆଡାପ୍ଟେସନ୍ · 87 ପଏଣ୍ଟ
| ଫିଲ୍ଡ | ସୃଷ୍ଟି ହୋଇଛି 10/12/2025 03:19 PM | ଅଦ୍ୟତନ 1/1 10/13/2025 09:44 AM |
|---|---|---|
| software_vendor | Tenda | Tenda |
| software_name | RP3 Pro | RP3 Pro |
| software_version | <=22.5.7.93 | <=22.5.7.93 |
| software_component | Firmware Update Handler | Firmware Update Handler |
| software_file | force_upgrade.sh | force_upgrade.sh |
| software_argument | current_force_upgrade_pwd | current_force_upgrade_pwd |
| vulnerability_cwe | CWE-259 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ) | CWE-259 (ଦୁର୍ବଳ ପ୍ରାମାଣିକରଣ) |
| vulnerability_risk | 2 | 2 |
| cvss3_vuldb_av | L | L |
| cvss3_vuldb_ac | L | L |
| cvss3_vuldb_pr | H | H |
| cvss3_vuldb_ui | N | N |
| cvss3_vuldb_s | U | U |
| cvss3_vuldb_c | H | H |
| cvss3_vuldb_i | H | H |
| cvss3_vuldb_a | H | H |
| cvss3_vuldb_e | P | P |
| cvss3_vuldb_rc | R | R |
| advisory_url | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md |
| exploit_availability | 1 | 1 |
| exploit_publicity | 1 | 1 |
| exploit_url | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md | https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md |
| source_cve | CVE-2025-11666 | CVE-2025-11666 |
| cna_responsible | VulDB | VulDB |
| software_type | Router Operating System | Router Operating System |
| cvss2_vuldb_av | L | L |
| cvss2_vuldb_ac | L | L |
| cvss2_vuldb_au | M | M |
| cvss2_vuldb_ci | C | C |
| cvss2_vuldb_ii | C | C |
| cvss2_vuldb_ai | C | C |
| cvss2_vuldb_e | POC | POC |
| cvss2_vuldb_rc | UR | UR |
| cvss4_vuldb_av | L | L |
| cvss4_vuldb_ac | L | L |
| cvss4_vuldb_pr | H | H |
| cvss4_vuldb_ui | N | N |
| cvss4_vuldb_vc | H | H |
| cvss4_vuldb_vi | H | H |
| cvss4_vuldb_va | H | H |
| cvss4_vuldb_e | P | P |
| cvss2_vuldb_rl | ND | ND |
| cvss3_vuldb_rl | X | X |
| cvss4_vuldb_at | N | N |
| cvss4_vuldb_sc | N | N |
| cvss4_vuldb_si | N | N |
| cvss4_vuldb_sa | N | N |
| cvss2_vuldb_basescore | 6.5 | 6.5 |
| cvss2_vuldb_tempscore | 5.6 | 5.6 |
| cvss3_vuldb_basescore | 6.7 | 6.7 |
| cvss3_vuldb_tempscore | 6.1 | 6.1 |
| cvss3_meta_basescore | 6.7 | 6.7 |
| cvss3_meta_tempscore | 6.1 | 6.4 |
| cvss4_vuldb_bscore | 8.4 | 8.4 |
| cvss4_vuldb_btscore | 7.0 | 7.0 |
| advisory_date | 1760220000 (10/12/2025) | 1760220000 (10/12/2025) |
| price_0day | $0-$5k | $0-$5k |
| cve_nvd_summary | A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used. | |
| cvss4_cna_av | L | |
| cvss4_cna_ac | L | |
| cvss4_cna_at | N | |
| cvss4_cna_pr | H | |
| cvss4_cna_ui | N | |
| cvss4_cna_vc | H | |
| cvss4_cna_vi | H | |
| cvss4_cna_va | H | |
| cvss4_cna_sc | N | |
| cvss4_cna_si | N | |
| cvss4_cna_sa | N | |
| cvss4_cna_bscore | 8.4 | |
| cvss3_cna_av | L | |
| cvss3_cna_ac | L | |
| cvss3_cna_pr | H | |
| cvss3_cna_ui | N | |
| cvss3_cna_s | U | |
| cvss3_cna_c | H | |
| cvss3_cna_i | H | |
| cvss3_cna_a | H | |
| cvss3_cna_basescore | 6.7 | |
| cvss2_cna_av | L | |
| cvss2_cna_ac | L | |
| cvss2_cna_au | M | |
| cvss2_cna_ci | C | |
| cvss2_cna_ii | C | |
| cvss2_cna_ai | C | |
| cvss2_cna_basescore | 6.5 |