First published: Thu May 01 2025(Updated: )
Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda RX2 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46629 is considered a critical vulnerability due to its potential for remote unauthorized access and configuration changes.
To fix CVE-2025-46629, it is essential to disable the 'ate' management binary or apply a patch provided by Tenda.
CVE-2025-46629 affects any Tenda RX2 Pro routers with the 'ate' management binary enabled.
CVE-2025-46629 allows attackers to exploit the vulnerability using crafted UDP packets.
Yes, CVE-2025-46629 can be exploited remotely by unauthenticated attackers.