First published: Thu May 01 2025(Updated: )
Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to enable telnet access to the router's OS by sending a /goform/telnet web request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda RX2 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46631 has a high severity rating due to its potential for unauthorized remote access.
To fix CVE-2025-46631, update the Tenda RX2 Pro firmware to the latest version provided by the manufacturer.
CVE-2025-46631 allows unauthenticated remote attackers to enable telnet access, compromising the router's security.
Users of the Tenda RX2 Pro with the affected firmware version are at risk from CVE-2025-46631.
Yes, CVE-2025-46631 is relatively easy to exploit due to the lack of authentication required for the telnet access.