Логотип exploitDog
bind:CVE-2025-11666
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-11666

Количество 3

Количество 3

nvd логотип

CVE-2025-11666

4 месяца назад

A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-gmjf-fc5r-h6v2

4 месяца назад

A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2025-13329

4 месяца назад

Уязвимость сценария force_upgrade.sh микропрограммного обеспечения IP-камер Tenda RP3 Pro, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-11666

A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.

CVSS3: 6.7
0%
Низкий
4 месяца назад
github логотип
GHSA-gmjf-fc5r-h6v2

A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.

CVSS3: 6.7
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-13329

Уязвимость сценария force_upgrade.sh микропрограммного обеспечения IP-камер Tenda RP3 Pro, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.7
0%
Низкий
4 месяца назад

Уязвимостей на страницу