CVE-2025-11666

6.7 MEDIUM

📋 TL;DR

This vulnerability in Tenda RP3 Pro routers allows local attackers to exploit a hard-coded password in the firmware update mechanism. Attackers with physical or local network access can potentially gain unauthorized control of the device. Only Tenda RP3 Pro routers running affected firmware versions are impacted.

💻 Affected Systems

Products:
  • Tenda RP3 Pro
Versions: Up to 22.5.7.93
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable; requires local access to exploit

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing firmware modification, persistent backdoor installation, and network traffic interception

🟠

Likely Case

Unauthorized firmware modification leading to device instability or limited control by attackers with local access

🟢

If Mitigated

Minimal impact if devices are physically secured and network access is restricted

🌐 Internet-Facing: LOW - Attack requires local access, cannot be exploited remotely
🏢 Internal Only: HIGH - Local network attackers can exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details published on GitHub; requires local access to execute

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 22.5.7.93

Vendor Advisory: https://www.tenda.com.cn/

Restart Required: Yes

Instructions:

1. Visit Tenda support website 2. Download latest firmware for RP3 Pro 3. Upload via router admin interface 4. Reboot device

🔧 Temporary Workarounds

Restrict physical and network access

all

Prevent unauthorized local access to router

Disable unnecessary services

all

Reduce attack surface by disabling unused router features

🧯 If You Can't Patch

  • Physically secure router in locked location
  • Implement network segmentation to isolate router management interface
  • Monitor for unauthorized firmware update attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version is 22.5.7.93 or earlier, device is vulnerable

Check Version:

Login to router admin interface and check firmware version in System Status

Verify Fix Applied:

Verify firmware version is newer than 22.5.7.93 after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized firmware update attempts
  • Unexpected force_upgrade.sh execution

Network Indicators:

  • Unexpected firmware download traffic
  • Unusual router management interface access

SIEM Query:

Search for 'force_upgrade.sh' or 'current_force_upgrade_pwd' in router logs

🔗 References

📤 Share & Export