Metrics
Affected Vendors & Products
Wed, 13 Aug 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. It has been classified as critical. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid." |
Tue, 12 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trendnet
Trendnet ti-g160i Trendnet ti-pg102i Trendnet tpl-430ap |
|
Vendors & Products |
Trendnet
Trendnet ti-g160i Trendnet ti-pg102i Trendnet tpl-430ap |
Fri, 08 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 08 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. It has been classified as critical. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | TRENDnet TI-G160i/TI-PG102i/TPL-430AP SSH Service default credentials | |
Weaknesses | CWE-1392 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-08T15:32:05.773Z
Updated: 2025-08-13T08:18:21.779Z
Reserved: 2025-08-08T07:45:03.332Z
Link: CVE-2025-8731

Updated: 2025-08-08T16:04:27.552Z

Status : Awaiting Analysis
Published: 2025-08-08T16:15:28.197
Modified: 2025-08-13T09:15:29.513
Link: CVE-2025-8731

No data.