ID

VAR-202505-1505


CVE

CVE-2025-46631


TITLE

Shenzhen Tenda Technology Co.,Ltd.  of  RX2 Pro  Authentication vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-005818

DESCRIPTION

Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable telnet access to the router's OS by sending a /goform/telnet web request. Shenzhen Tenda Technology Co.,Ltd. of RX2 Pro An authentication vulnerability exists in firmware.Information may be obtained and information may be tampered with. Tenda RX2 Pro is a high-performance WiFi 6 signal amplifier from China's Tenda

Trust: 2.16

sources: NVD: CVE-2025-46631 // JVNDB: JVNDB-2025-005818 // CNVD: CNVD-2025-13838

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-13838

AFFECTED PRODUCTS

vendor:tendamodel:rx2 proscope:eqversion:16.03.30.14

Trust: 1.6

vendor:tendamodel:rx2 proscope:eqversion:rx2 pro firmware 16.03.30.14

Trust: 0.8

vendor:tendamodel:rx2 proscope:eqversion: -

Trust: 0.8

vendor:tendamodel:rx2 proscope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2025-13838 // JVNDB: JVNDB-2025-005818 // NVD: CVE-2025-46631

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-46631
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-005818
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-13838
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-13838
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-46631
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-005818
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-13838 // JVNDB: JVNDB-2025-005818 // NVD: CVE-2025-46631

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

problemtype:Inappropriate authentication (CWE-287) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-005818 // NVD: CVE-2025-46631

PATCH

title:Patch for Tenda RX2 Pro Security Bypass Vulnerability (CNVD-2025-13838)url:https://www.cnvd.org.cn/patchInfo/show/702401

Trust: 0.6

sources: CNVD: CNVD-2025-13838

EXTERNAL IDS

db:NVDid:CVE-2025-46631

Trust: 3.2

db:JVNDBid:JVNDB-2025-005818

Trust: 0.8

db:CNVDid:CNVD-2025-13838

Trust: 0.6

sources: CNVD: CNVD-2025-13838 // JVNDB: JVNDB-2025-005818 // NVD: CVE-2025-46631

REFERENCES

url:https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/readme?id=cve-2025-46631-enable-telnet-unauthenticated-through-httpd

Trust: 1.8

url:https://www.tendacn.com/us/default.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-46631

Trust: 1.4

sources: CNVD: CNVD-2025-13838 // JVNDB: JVNDB-2025-005818 // NVD: CVE-2025-46631

SOURCES

db:CNVDid:CNVD-2025-13838
db:JVNDBid:JVNDB-2025-005818
db:NVDid:CVE-2025-46631

LAST UPDATE DATE

2025-06-27T23:08:26.144000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-13838date:2025-06-26T00:00:00
db:JVNDBid:JVNDB-2025-005818date:2025-05-29T01:21:00
db:NVDid:CVE-2025-46631date:2025-05-27T14:24:42.853

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-13838date:2025-06-26T00:00:00
db:JVNDBid:JVNDB-2025-005818date:2025-05-29T00:00:00
db:NVDid:CVE-2025-46631date:2025-05-01T20:15:39.010