Monday, May 19, 2025
HomeCVE/vulnerabilityMultiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro Dual-Band Gigabit Wi-Fi 6 Router (Firmware V16.03.30.14), which could allow remote attackers to gain administrative access and, in many cases, full root shell on the device.

Despite the notification, Tenda has not responded, and no patches are available.

Eleven separate CVEs have been assigned to vulnerabilities discovered in Tenda’s web management portal, firmware, and internal services.

- Advertisement - Google News

Attackers can exploit combinations of these bugs to escalate privileges, bypass network segmentation, and ultimately execute arbitrary code with root privileges.

The vulnerabilities are particularly troubling because they can be exploited by anyone who connects to the device-even from the guest Wi-Fi network, which is supposed to be isolated.

How the Attacks Work

The Tenda RX2 Pro’s web management interface contains numerous flaws in how it transmits and encrypts credentials and session keys.

Additionally, improper network segmentation means attackers on a guest Wi-Fi network can target the main router functions or other clients.

Most disturbingly, attackers can enable backdoor services like telnet and an undocumented service called “ate,” both of which have their severe flaws, including command injection vulnerabilities and static credentials.

Summary of Key Vulnerabilities

CVESummaryImpact
CVE-2025-46634Transmission of plaintext credentials in httpdAllows credential theft and replay from observed traffic
CVE-2025-46632Static IV use in web encryptionMakes encrypted sessions easier to decrypt
CVE-2025-46633Transmission of AES encryption key in plaintextEnables interception & decryption of management traffic
CVE-2025-46635Improper network isolation between guest/primary networksGuest users can attack the router and main network
CVE-2025-46631Unauthenticated enabling of telnet via web APIRemote root shell via backdoor, no authentication needed
CVE-2025-46627OS root password generated from device MAC addressAllows attacker to calculate and use the root password
CVE-2025-46630Unauthenticated enabling of “ate” service via web APIActivates a vulnerable, undocumented management service
CVE-2025-46629“ate” service lacks authenticationAnyone can send commands to the service
CVE-2025-46626“ate” service uses static key/IV for encryptionAllows traffic replay, decryption, and forging commands
CVE-2025-46628Command injection in “ate” via ifconfig commandUnauthenticated root command execution
CVE-2025-46625Command injection in setLanCfg httpd APIAuthenticated users can get persistent root shell

Exploit Scenarios

  • Guest Network Bypass: Attackers on the guest Wi-Fi can become “layer-2 adjacent” to the main network and bypass basic subnet restrictions. This provides a launchpad for further attacks.
  • Backdoor Services: Unauthenticated users can turn on a telnet or “ate” service, both backdoors that grant shell access or allow command injection with no password required.
  • Weak Encryption: Even where encryption is used, the static IVs and keys, and the transmission of those keys in plaintext, render it ineffective. Attackers can intercept and decrypt admin commands and sessions.

The researcher has reported all findings to Tenda, but as of publication, no updates or fixes have been issued.

Owners of the Tenda RX2 Pro are strongly urged to disconnect their routers from untrusted networks and consider alternative devices until official patches are released.

These vulnerabilities highlight the need for robust, industry-standard security practices in consumer networking gear. Until Tenda responds, users remain at serious risk from attackers both inside and outside their networks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...