Логотип exploitDog
bind:CVE-2025-9091
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-9091

Количество 3

Количество 3

nvd логотип

CVE-2025-9091

6 месяцев назад

A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 2.5
EPSS: Низкий
github логотип

GHSA-vq2h-cfxr-pp9q

6 месяцев назад

A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 2.5
EPSS: Низкий
fstec логотип

BDU:2025-10203

6 месяцев назад

Уязвимость микропрограммного обеспечения маршрутизаторов Tenda AC20, связанная с использованием жестко закодированных учетных данных, позволяющая нарушителю получить несанкционированный доступ к устройству

CVSS3: 2.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-9091

A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 2.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-vq2h-cfxr-pp9q

A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 2.5
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-10203

Уязвимость микропрограммного обеспечения маршрутизаторов Tenda AC20, связанная с использованием жестко закодированных учетных данных, позволяющая нарушителю получить несанкционированный доступ к устройству

CVSS3: 2.5
0%
Низкий
6 месяцев назад

Уязвимостей на страницу