← Back to CVEs
CVE-2025-9091
LOW2.5
Description
A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CVE Details
CVSS v3.1 Score2.5
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published8/17/2025
Last Modified4/29/2026
Sourcenvd
Honeypot Sightings0
Affected Products
tenda:ac20tenda:ac20_firmware
Weaknesses (CWE)
CWE-259CWE-798
References
https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description(cna@vuldb.com)
https://vuldb.com/?ctiid.320359(cna@vuldb.com)
https://vuldb.com/?id.320359(cna@vuldb.com)
https://vuldb.com/?submit.632268(cna@vuldb.com)
https://www.tenda.com.cn/(cna@vuldb.com)
https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.