ID

VAR-202505-0993


CVE

CVE-2025-46632


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Vulnerability in firmware regarding reuse of cryptographic nonce and key pairs

Trust: 0.8

sources: JVNDB: JVNDB-2025-005766

DESCRIPTION

Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro The firmware contains a vulnerability related to the reuse of cryptographic nonce and key pairs.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda. Tenda RX2 Pro 16.03.30.14 version has an information leakage vulnerability, which can lead to decryption of encrypted messages by attackers

Trust: 2.16

sources: NVD: CVE-2025-46632 // JVNDB: JVNDB-2025-005766 // CNVD: CNVD-2025-13835

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-13835

AFFECTED PRODUCTS

vendor:tendamodel:rx2 proscope:eqversion:16.03.30.14

Trust: 1.6

vendor:tendamodel:rx2 proscope:eqversion:rx2 pro firmware 16.03.30.14

Trust: 0.8

vendor:tendamodel:rx2 proscope:eqversion: -

Trust: 0.8

vendor:tendamodel:rx2 proscope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2025-13835 // JVNDB: JVNDB-2025-005766 // NVD: CVE-2025-46632

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-46632
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-005766
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-13835
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-13835
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-46632
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-005766
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-13835 // JVNDB: JVNDB-2025-005766 // NVD: CVE-2025-46632

PROBLEMTYPE DATA

problemtype:CWE-323

Trust: 1.0

problemtype:Reusing nonces and key pairs for cryptographic operations (CWE-323) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-005766 // NVD: CVE-2025-46632

PATCH

title:Patch for Tenda RX2 Pro Information Disclosure Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/702381

Trust: 0.6

sources: CNVD: CNVD-2025-13835

EXTERNAL IDS

db:NVDid:CVE-2025-46632

Trust: 3.2

db:JVNDBid:JVNDB-2025-005766

Trust: 0.8

db:CNVDid:CNVD-2025-13835

Trust: 0.6

sources: CNVD: CNVD-2025-13835 // JVNDB: JVNDB-2025-005766 // NVD: CVE-2025-46632

REFERENCES

url:https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/readme?id=cve-2025-46632-static-iv-use-in-httpd

Trust: 1.8

url:https://www.tendacn.com/us/default.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-46632

Trust: 1.4

sources: CNVD: CNVD-2025-13835 // JVNDB: JVNDB-2025-005766 // NVD: CVE-2025-46632

SOURCES

db:CNVDid:CNVD-2025-13835
db:JVNDBid:JVNDB-2025-005766
db:NVDid:CVE-2025-46632

LAST UPDATE DATE

2025-06-28T23:33:02.695000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-13835date:2025-06-26T00:00:00
db:JVNDBid:JVNDB-2025-005766date:2025-05-28T05:47:00
db:NVDid:CVE-2025-46632date:2025-05-27T14:17:19.890

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-13835date:2025-06-26T00:00:00
db:JVNDBid:JVNDB-2025-005766date:2025-05-28T00:00:00
db:NVDid:CVE-2025-46632date:2025-05-01T20:15:39.167