Tenda CP3 Pro Firmware V22.5.4.93 contains a hardcoded root password hash in the /etc/passwd file and /etc/passwd-. An attacker with access to the firmware image can extract and attempt to crack the root password hash, potentially obtaining administrative access
                
            References
                    | Link | Resource | 
|---|---|
| https://cybermaya.in/posts/Post-39/ | Exploit Third Party Advisory | 
| https://www.tendacn.com/product/download/cp3pro.html | Broken Link | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    02 Aug 2025, 01:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cybermaya.in/posts/Post-39/ - Exploit, Third Party Advisory | |
| References | () https://www.tendacn.com/product/download/cp3pro.html - Broken Link | |
| CPE | cpe:2.3:o:tenda:cp3_pro_firmware:22.5.4.93:*:*:*:*:*:*:* cpe:2.3:h:tenda:cp3_pro:-:*:*:*:*:*:*:* | |
| First Time | Tenda cp3 Pro Firmware Tenda Tenda cp3 Pro | 
14 Jul 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-14 18:15
Updated : 2025-08-02 01:36
NVD link : CVE-2025-52363
Mitre link : CVE-2025-52363
CVE.ORG link : CVE-2025-52363
JSON object : View
Products Affected
                tenda
- cp3_pro
- cp3_pro_firmware
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
