Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-13260 Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 27 May 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda rx2 Pro
Tenda rx2 Pro Firmware
CPEs cpe:2.3:h:tenda:rx2_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:rx2_pro_firmware:16.03.30.14:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda rx2 Pro
Tenda rx2 Pro Firmware

Fri, 02 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 01 May 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 01 May 2025 19:30:00 +0000

Type Values Removed Values Added
Description Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-02T13:06:24.956Z

Reserved: 2025-04-26T00:00:00.000Z

Link: CVE-2025-46625

cve-icon Vulnrichment

Updated: 2025-05-01T20:23:52.683Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-01T20:15:38.037

Modified: 2025-05-27T14:22:39.907

Link: CVE-2025-46625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.