ID

VAR-202501-1425


CVE

CVE-2025-0528


TITLE

plural  Shenzhen Tenda Technology Co.,Ltd.  Product Injection Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2025-005832

DESCRIPTION

A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Shenzhen Tenda Technology Co.,Ltd. of AC8 firmware, AC10 firmware, AC18 The firmware has injection vulnerabilities, command injection vulnerabilities, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the file /goform/telnet failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution

Trust: 2.16

sources: NVD: CVE-2025-0528 // JVNDB: JVNDB-2025-005832 // CNVD: CNVD-2025-02533

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-02533

AFFECTED PRODUCTS

vendor:tendamodel:ac10scope:eqversion:16.03.10.20

Trust: 1.6

vendor:tendamodel:ac8scope:eqversion:16.03.10.20

Trust: 1.0

vendor:tendamodel:ac18scope:eqversion:16.03.10.20

Trust: 1.0

vendor:tendamodel:ac10scope: - version: -

Trust: 0.8

vendor:tendamodel:ac18scope: - version: -

Trust: 0.8

vendor:tendamodel:ac8scope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2025-02533 // JVNDB: JVNDB-2025-005832 // NVD: CVE-2025-0528

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-0528
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-0528
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-005832
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-02533
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-0528
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-005832
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-02533
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-0528
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: JVNDB-2025-005832
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-02533 // JVNDB: JVNDB-2025-005832 // NVD: CVE-2025-0528 // NVD: CVE-2025-0528

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-74

Trust: 1.0

problemtype:CWE-78

Trust: 1.0

problemtype:injection (CWE-74) [ others ]

Trust: 0.8

problemtype: Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-005832 // NVD: CVE-2025-0528

EXTERNAL IDS

db:NVDid:CVE-2025-0528

Trust: 3.2

db:VULDBid:292412

Trust: 1.8

db:JVNDBid:JVNDB-2025-005832

Trust: 0.8

db:CNVDid:CNVD-2025-02533

Trust: 0.6

sources: CNVD: CNVD-2025-02533 // JVNDB: JVNDB-2025-005832 // NVD: CVE-2025-0528

REFERENCES

url:https://github.com/pr0b1em/iot/blob/master/tendaac10v16.03.10.20telnet.md

Trust: 1.8

url:https://vuldb.com/?id.292412

Trust: 1.8

url:https://vuldb.com/?submit.478175

Trust: 1.8

url:https://www.tenda.com.cn/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-0528

Trust: 1.4

url:https://vuldb.com/?ctiid.292412

Trust: 1.0

sources: CNVD: CNVD-2025-02533 // JVNDB: JVNDB-2025-005832 // NVD: CVE-2025-0528

SOURCES

db:CNVDid:CNVD-2025-02533
db:JVNDBid:JVNDB-2025-005832
db:NVDid:CVE-2025-0528

LAST UPDATE DATE

2025-05-30T23:22:03.721000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-02533date:2025-02-06T00:00:00
db:JVNDBid:JVNDB-2025-005832date:2025-05-29T02:39:00
db:NVDid:CVE-2025-0528date:2025-05-28T14:42:21.953

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-02533date:2025-01-23T00:00:00
db:JVNDBid:JVNDB-2025-005832date:2025-05-29T00:00:00
db:NVDid:CVE-2025-0528date:2025-01-17T15:15:12.430