CVE-2025-9731
low-risk
Published 2025-08-31
A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.5/10
Low
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.md
Permissions Required
https://vuldb.com/?ctiid.322022
Third Party Advisory
https://vuldb.com/?id.322022
Third Party Advisory
https://vuldb.com/?submit.639748
Product
https://www.tenda.com.cn/
Third Party Advisory
https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.md
11
/ 100
low-risk
Severity
6/34 · Minimal
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal