AES Key Reuse Vulnerability in Tenda RX2 Pro by Tenda
CVE-2025-46626
7.3HIGH
Summary
A vulnerability exists in the Tenda RX2 Pro where a static AES key and initialization vector are reused for encrypted communication with the 'ate' management service. This design flaw allows potential attackers to decrypt traffic, replay communications, or forge messages, compromising the integrity and confidentiality of the affected service. This issue is critical for users relying on secure data transmission for IoT functionalities, as it opens the door to various cyberattacks.
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published