Tenda RX2 Pro Flaws Allow Attackers to Gain Admin Access

Security researchers have uncovered eleven severe vulnerabilities in the Tenda RX2 Pro Dual-Band Gigabit Wi-Fi 6 Router (firmware V16.03.30.14), exposing millions of users to potential remote attacks, including full device takeover.

Despite responsible disclosure, Tenda has not responded, leaving all known devices unpatched and at risk.

Reverse Engineering Challenges and Firmware Analysis

According to the report, Researchers initially sought to improve QEMU emulation using Tenda firmware, discovering that recent Tenda devices utilize encrypted firmware blobs.

However, the RX2 Pro’s onboard flash was unencrypted, allowing the extraction and unpacking of the root partition.

The firmware used a modified SquashFS filesystem, with altered magic bytes and CRC polynomials, complicating analysis but ultimately yielding to custom tooling.

Web Management Portal: Encryption Flaws and Credential Exposure

The RX2 Pro’s web management portal attempts to secure traffic using custom encryption rather than GoAhead’s standard TLS/SSL.

This approach introduced several critical vulnerabilities:

  • CVE-2025-46634: Transmission of Plaintext Credentials
    User credentials are transmitted in plaintext over HTTP during authentication, even when remote management is enabled.
  • Though the password is hashed (using MD5), the hash can be replayed for unauthorized access. textPOST /login HTTP/1.1 Host: 192.168.0.1 Content-Type: application/x-www-form-urlencoded username=admin&password=21232f297a57a5a743894a0e4a801fc3
  • CVE-2025-46632: Static IV Use in AES-128-CBC Encryption
    After authentication, traffic is encrypted with AES-128-CBC, but a static IV ("EU5H62G9ICGRNI43") is reused for every session, undermining cryptographic security. cEVP_DecryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv); // iv is always static
  • CVE-2025-46633: Plaintext Transmission of Symmetric Key
    The AES key used for session encryption is sent in plaintext to the client post-authentication, allowing any eavesdropper to decrypt subsequent traffic.

Guest Network Isolation and Lateral Movement

  • CVE-2025-46635: Improper Network Isolation
    The router separates guest and primary networks only by subnetting, not by true layer-2 isolation.
  • Attackers on the guest network can scan and access devices on the primary network by spoofing their IP address, easily bypassing weak access controls.

Multiple Paths to Root Shell: Telnet, ATE Service, and Command Injection

  • CVE-2025-46631: Unauthenticated Telnet Enablement
    An unauthenticated attacker can enable Telnet by accessing the /goform/telnet endpoint, which is whitelisted and does not require authentication. bashcurl -X POST http://192.168.0.1/goform/telnet
  • CVE-2025-46627: Predictable Root Password
    The root password is generated at boot from the last two octets of the device’s MAC address, making it trivial to compute.
  • CVE-2025-46630, 46629, 46626, 46628: ATE Management Binary Vulnerabilities
    The undocumented ate service can be enabled without authentication via /goform/ate, listens on UDP port 7329, and uses a static key ("Tenda0123456789M") and IV (all zeros) for weak encryption. It accepts unauthenticated commands, including those that allow arbitrary command injection via the ifconfig handler. python# Example: Sending a crafted UDP packet to 7329/udp for command injection sock.sendto(encrypt("ifconfig; /bin/sh"), ("192.168.0.1", 7329))
  • CVE-2025-46625: Persistent Command Injection via setLanCfg
    Attackers authenticated to the web portal can inject commands through the setLanCfg API, leading to persistent root access.

No Patch, High Risk

With no official patch or remediation from Tenda, all users of the RX2 Pro router are advised to disconnect the device from untrusted networks and monitor for unusual activity.

The combination of plaintext credentials, static cryptographic keys, weak network segmentation, and multiple unauthenticated root paths makes this one of the most severe consumer router exposures in recent years.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here