Vulnerability Description
A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument current_force_upgrade_pwd can lead to use of hard-coded password. The attack can only be executed locally. The exploit has been published and may be used.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/RP3.md
- https://vuldb.com/?ctiid.328085
- https://vuldb.com/?id.328085
- https://vuldb.com/?submit.673128
- https://www.tenda.com.cn/
FAQ
What is CVE-2025-11666?
CVE-2025-11666 is a vulnerability with a CVSS score of 6.7 (MEDIUM). A flaw has been found in Tenda RP3 Pro up to 22.5.7.93. This impacts an unknown function of the file force_upgrade.sh of the component Firmware Update Handler. Executing manipulation of the argument c...
How severe is CVE-2025-11666?
CVE-2025-11666 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11666?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.