Tenda Rx2 Pro Firmware vulnerabilities
11 known vulnerabilities affecting tenda/rx2_pro_firmware.
Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH7MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2025-46627HIGHCVSS 8.2v16.03.30.142025-05-01
CVE-2025-46627 [HIGH] CWE-922 CVE-2025-46627: Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authe
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
nvd
CVE-2025-46625HIGHCVSS 8.8v16.03.30.142025-05-01
CVE-2025-46625 [HIGH] CWE-77 CVE-2025-46625: Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro
Lack of input validation/sanitization in the 'setLanCfg' API endpoint in httpd in the Tenda RX2 Pro 16.03.30.14 allows a remote attacker that is authorized to the web management portal to gain root shell access to the device by sending a crafted web request. This is persistent because the command injection is saved in the configuration of the device.
nvd
CVE-2025-46633HIGHCVSS 8.2v16.03.30.142025-05-01
CVE-2025-46633 [HIGH] CWE-312 CVE-2025-46633: Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16
Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt traffic between the client and server by collecting the symmetric AES key from collected and/or observed traffic. The AES key in sent in cleartext in response to successful authentication. The IV is always EU5H62G
nvd
CVE-2025-46634HIGHCVSS 8.2v16.03.30.142025-05-01
CVE-2025-46634 [HIGH] CWE-312 CVE-2025-46634: Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16
Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an unauthenticated attacker to authenticate to the web management portal by collecting credentials from observed/collected traffic. It implements encryption, but not until after the user has transmitted the hash of their password in
nvd
CVE-2025-46628HIGHCVSS 7.3v16.03.30.142025-05-01
CVE-2025-46628 [HIGH] CWE-284 CVE-2025-46628: Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.
Lack of input validation/sanitization in the 'ate' management service in the Tenda RX2 Pro 16.03.30.14 allows an unauthorized remote attacker to gain root shell access to the device by sending a crafted UDP packet to the 'ate' service when it is enabled. Authentication is not needed.
nvd
CVE-2025-46635HIGHCVSS 7.1v16.03.30.142025-05-01
CVE-2025-46635 [HIGH] CWE-284 CVE-2025-46635: An issue was discovered on Tenda RX2 Pro 16.03.30.14 devices. Improper network isolation between the
An issue was discovered on Tenda RX2 Pro 16.03.30.14 devices. Improper network isolation between the guest Wi-Fi network and other network interfaces on the router allows an attacker (who is authenticated to the guest Wi-Fi) to access resources on the router and/or resources and devices on other networks hosted by the router by configuring a static IP
nvd
CVE-2025-46626HIGHCVSS 7.3v16.03.30.142025-05-01
CVE-2025-46626 [HIGH] CWE-326 CVE-2025-46626: Reuse of a static AES key and initialization vector for encrypted traffic to the 'ate' management se
Reuse of a static AES key and initialization vector for encrypted traffic to the 'ate' management service of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt, replay, and/or forge traffic to the service.
nvd
CVE-2025-46632MEDIUMCVSS 6.5v16.03.30.142025-05-01
CVE-2025-46632 [MEDIUM] CWE-323 CVE-2025-46632: Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may a
Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server.
nvd
CVE-2025-46630MEDIUMCVSS 6.5v16.03.30.142025-05-01
CVE-2025-46630 [MEDIUM] CWE-287 CVE-2025-46630: Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an una
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable 'ate' (a remote system management binary) by sending a /goform/ate web request.
nvd
CVE-2025-46629MEDIUMCVSS 6.5v16.03.30.142025-05-01
CVE-2025-46629 [MEDIUM] CWE-284 CVE-2025-46629: Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an un
Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet
nvd
CVE-2025-46631MEDIUMCVSS 6.5v16.03.30.142025-05-01
CVE-2025-46631 [MEDIUM] CWE-287 CVE-2025-46631: Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an una
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable telnet access to the router's OS by sending a /goform/telnet web request.
nvd