A vulnerability was determined in Tenda AC9 15.03.05.19. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials. It is possible to launch the attack on the local host. The attack's complexity is rated as high. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized.
References
Link | Resource |
---|---|
https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.md | Third Party Advisory |
https://vuldb.com/?ctiid.322022 | Permissions Required |
https://vuldb.com/?id.322022 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.639748 | Third Party Advisory VDB Entry |
https://www.tenda.com.cn/ | Product |
https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
04 Sep 2025, 16:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tenda ac9 Firmware
Tenda Tenda ac9 |
|
CPE | cpe:2.3:o:tenda:ac9_firmware:15.03.05.19:*:*:*:*:*:*:* cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:* |
|
References | () https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.md - Third Party Advisory | |
References | () https://vuldb.com/?ctiid.322022 - Permissions Required | |
References | () https://vuldb.com/?id.322022 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.639748 - Third Party Advisory, VDB Entry | |
References | () https://www.tenda.com.cn/ - Product |
02 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e4.md - |
31 Aug 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-31 14:15
Updated : 2025-09-04 16:49
NVD link : CVE-2025-9731
Mitre link : CVE-2025-9731
CVE.ORG link : CVE-2025-9731
JSON object : View
Products Affected
tenda
- ac9
- ac9_firmware