Metrics
Affected Vendors & Products
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Tenda Tenda rp3 Pro | |
| Vendors & Products | Tenda Tenda rp3 Pro | 
Tue, 14 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 13 Oct 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used. | |
| Title | Tenda RP3 Pro Firmware Update force_upgrade.sh hard-coded password | |
| Weaknesses | CWE-255 CWE-259 | |
| References |  | |
| Metrics | cvssV2_0 
 
 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulDB
Published: 2025-10-13T07:02:07.269Z
Updated: 2025-10-14T15:03:06.353Z
Reserved: 2025-10-12T13:14:23.093Z
Link: CVE-2025-11666
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-14T15:03:02.163Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-13T07:15:53.063
Modified: 2025-10-14T19:36:59.730
Link: CVE-2025-11666
 Redhat
                        Redhat
                    No data.