Vulnerability Description
A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Ac9 Firmware | 15.03.05.19 |
| Tenda | Ac9 | - |
Related Weaknesses (CWE)
References
- https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.mdThird Party Advisory
- https://vuldb.com/?ctiid.322022Permissions Required
- https://vuldb.com/?id.322022Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.639748Third Party AdvisoryVDB Entry
- https://www.tenda.com.cn/Product
- https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.mdThird Party Advisory
FAQ
What is CVE-2025-9731?
CVE-2025-9731 is a vulnerability with a CVSS score of 2.5 (LOW). A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard...
How severe is CVE-2025-9731?
CVE-2025-9731 has been rated LOW with a CVSS base score of 2.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-9731?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Ac9 Firmware, Tenda Ac9.