CVE-2025-70798

Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:i24_firmware:3.0.0.5:*:*:*:*:*:*:*
cpe:2.3:h:tenda:i24:3.0:*:*:*:*:*:*:*

History

09 Apr 2026, 20:27

Type Values Removed Values Added
First Time Tenda
Tenda i24 Firmware
Tenda i24
References () https://github.com/vuln-1/vuln/blob/main/Tenda/i24V3.0si_V3.0.0.5/report-1.md - () https://github.com/vuln-1/vuln/blob/main/Tenda/i24V3.0si_V3.0.0.5/report-1.md - Exploit, Third Party Advisory
References () https://www.tendacn.com/ - () https://www.tendacn.com/ - Product
CPE cpe:2.3:o:tenda:i24_firmware:3.0.0.5:*:*:*:*:*:*:*
cpe:2.3:h:tenda:i24:3.0:*:*:*:*:*:*:*

12 Mar 2026, 20:16

Type Values Removed Values Added
References () https://github.com/vuln-1/vuln/blob/main/Tenda/i24V3.0si_V3.0.0.5/report-1.md - () https://github.com/vuln-1/vuln/blob/main/Tenda/i24V3.0si_V3.0.0.5/report-1.md -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.4
CWE CWE-259

11 Mar 2026, 13:52

Type Values Removed Values Added
Summary
  • (es) El firmware Tenda i24V3.0si V3.0.0.5 V3.0.0.5 se descubrió que contenía una vulnerabilidad de contraseña codificada de forma rígida en /etc_ro/shadow, lo que permite a los atacantes iniciar sesión como root.

10 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 21:16

Updated : 2026-04-09 20:27


NVD link : CVE-2025-70798

Mitre link : CVE-2025-70798

CVE.ORG link : CVE-2025-70798


JSON object : View

Products Affected

tenda

  • i24_firmware
  • i24
CWE
CWE-259

Use of Hard-coded Password