Vulnerability Description
Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Rx2 Pro Firmware | 16.03.30.14 |
| Tenda | Rx2 Pro | - |
Related Weaknesses (CWE)
References
- https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46Third Party Advisory
- https://www.tendacn.com/us/default.htmlProduct
FAQ
What is CVE-2025-46625?
CVE-2025-46625 is a vulnerability with a CVSS score of 8.8 (HIGH). Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root sh...
How severe is CVE-2025-46625?
CVE-2025-46625 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46625?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Rx2 Pro Firmware, Tenda Rx2 Pro.