Vulnerability Description
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Rx2 Pro Firmware | 16.03.30.14 |
| Tenda | Rx2 Pro | - |
Related Weaknesses (CWE)
References
- https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46ExploitThird Party Advisory
- https://www.tendacn.com/us/default.htmlProduct
FAQ
What is CVE-2025-46627?
CVE-2025-46627 is a vulnerability with a CVSS score of 8.2 (HIGH). Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device infor...
How severe is CVE-2025-46627?
CVE-2025-46627 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46627?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Rx2 Pro Firmware, Tenda Rx2 Pro.