Risky Cryptographic Algorithm in Tenda CP6 Routers
CVE-2025-9828

6.3MEDIUM

Key Information:

Vendor

Tenda

Status
Vendor
CVE Published:
2 September 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-9828?

A vulnerability exists in the Tenda CP6 router version 11.10.00.243 within the uhttp component's function sub_2B7D04. This flaw allows remote attackers to manipulate cryptographic processes, potentially leading to exposure of sensitive data through risky algorithms. Although the complexity of exploiting this vulnerability is high, the fact that the exploit has been publicly disclosed raises concerns about its potential use in real-world attacks. It is vital for users to take appropriate security measures to mitigate this risk.

Affected Version(s)

CP6 11.10.00.243

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

IOT_Res (VulDB User)
.
CVE-2025-9828 : Risky Cryptographic Algorithm in Tenda CP6 Routers