Vulnerability Description
Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Rx2 Pro Firmware | 16.03.30.14 |
| Tenda | Rx2 Pro | - |
Related Weaknesses (CWE)
References
- https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46ExploitThird Party Advisory
- https://www.tendacn.com/us/default.htmlProduct
FAQ
What is CVE-2025-46628?
CVE-2025-46628 is a vulnerability with a CVSS score of 7.3 (HIGH). Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a craft...
How severe is CVE-2025-46628?
CVE-2025-46628 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46628?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Rx2 Pro Firmware, Tenda Rx2 Pro.