CVE-2025-9091
Severity CVSS v4.0:
LOW
Type:
CWE-259
Use of Hard-coded Password
Publication date:
17/08/2025
Last modified:
21/08/2025
Description
A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Impact
Base Score 4.0
2.00
Severity 4.0
LOW
Base Score 3.x
2.50
Severity 3.x
LOW
Base Score 2.0
1.00
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:* | ||
| cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description
- https://github.com/ZZ2266/.github.io/tree/main/AC20/hardcoded%20password/readme.md
- https://vuldb.com/?ctiid_320359=
- https://vuldb.com/?id_320359=
- https://vuldb.com/?submit_632268=
- https://www.tenda.com.cn/
- https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md
- https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description



