Количество 3
Количество 3
CVE-2025-46627
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
GHSA-w5qh-gchv-44g2
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
BDU:2025-05629
Уязвимость реализации протокола telnet микропрограммного обеспечения маршрутизаторов Tenda RX2 Pro, позволяющая нарушителю раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-46627 Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address. | CVSS3: 8.2 | 0% Низкий | 9 месяцев назад | |
GHSA-w5qh-gchv-44g2 Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address. | CVSS3: 8.2 | 0% Низкий | 9 месяцев назад | |
BDU:2025-05629 Уязвимость реализации протокола telnet микропрограммного обеспечения маршрутизаторов Tenda RX2 Pro, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 8.2 | 0% Низкий | 9 месяцев назад |
Уязвимостей на страницу