CVE-2025-9725 (GCVE-0-2025-9725)
Vulnerability from cvelistv5
Published
2025-08-31 10:02
Modified
2025-09-02 15:15
CWE
  • CWE-259 - Use of Hard-coded Password
  • CWE-255 - Credentials Management
Summary
A vulnerability was identified in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password. The attack must be carried out locally. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit is publicly available and might be used. Upgrading to version 2.3.13 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "[T]he firmware does store a default password of 'admin'. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page."
Impacted products
Vendor Product Version
Cudy LT500E Version: 2.3.0
Version: 2.3.1
Version: 2.3.2
Version: 2.3.3
Version: 2.3.4
Version: 2.3.5
Version: 2.3.6
Version: 2.3.7
Version: 2.3.8
Version: 2.3.9
Version: 2.3.10
Version: 2.3.11
Version: 2.3.12
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-9725",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-02T14:43:03.310537Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-02T15:15:41.108Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md#steps-to-reproduce"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Web Interface"
          ],
          "product": "LT500E",
          "vendor": "Cudy",
          "versions": [
            {
              "status": "affected",
              "version": "2.3.0"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.3.4"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.3.6"
            },
            {
              "status": "affected",
              "version": "2.3.7"
            },
            {
              "status": "affected",
              "version": "2.3.8"
            },
            {
              "status": "affected",
              "version": "2.3.9"
            },
            {
              "status": "affected",
              "version": "2.3.10"
            },
            {
              "status": "affected",
              "version": "2.3.11"
            },
            {
              "status": "affected",
              "version": "2.3.12"
            },
            {
              "status": "unaffected",
              "version": "2.3.13"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "lxyilu (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was identified in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password. The attack must be carried out locally. The attack\u0027s complexity is rated as high. The exploitability is told to be difficult. The exploit is publicly available and might be used. Upgrading to version 2.3.13 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: \"[T]he firmware does store a default password of \u0027admin\u0027. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page.\""
        },
        {
          "lang": "de",
          "value": "In Cudy LT500E bis 2.3.12 wurde eine Schwachstelle gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /squashfs-root/etc/shadow der Komponente Web Interface. Dank der Manipulation mit unbekannten Daten kann eine use of hard-coded password-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Das Durchf\u00fchren eines Angriffs ist mit einer relativ hohen Komplexit\u00e4t verbunden. Die Ausnutzung wird als schwierig beschrieben. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden. Ein Aktualisieren auf die Version 2.3.13 vermag dieses Problem zu l\u00f6sen. Die Aktualisierung der betroffenen Komponente wird empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 1,
            "vectorString": "AV:L/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-259",
              "description": "Use of Hard-coded Password",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-255",
              "description": "Credentials Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-31T10:02:06.702Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-322014 | Cudy LT500E Web shadow hard-coded password",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.322014"
        },
        {
          "name": "VDB-322014 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.322014"
        },
        {
          "name": "Submit #639346 | Cudy Cudy LT500E 1.0 Router LT500E-R42-2.3.13 Insecure Storage of Sensitive Information",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.639346"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md#steps-to-reproduce"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-08-30T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-08-30T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-08-30T15:45:07.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Cudy LT500E Web shadow hard-coded password"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-9725",
    "datePublished": "2025-08-31T10:02:06.702Z",
    "dateReserved": "2025-08-30T13:40:00.256Z",
    "dateUpdated": "2025-09-02T15:15:41.108Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-9725\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-02T14:43:03.310537Z\"}}}], \"references\": [{\"url\": \"https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md\", \"tags\": [\"exploit\"]}, {\"url\": \"https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md#steps-to-reproduce\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-02T14:43:14.122Z\"}}], \"cna\": {\"title\": \"Cudy LT500E Web shadow hard-coded password\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"lxyilu (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 2, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 2.5, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 2.5, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 1, \"vectorString\": \"AV:L/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C\"}}], \"affected\": [{\"vendor\": \"Cudy\", \"modules\": [\"Web Interface\"], \"product\": \"LT500E\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.3.0\"}, {\"status\": \"affected\", \"version\": \"2.3.1\"}, {\"status\": \"affected\", \"version\": \"2.3.2\"}, {\"status\": \"affected\", \"version\": \"2.3.3\"}, {\"status\": \"affected\", \"version\": \"2.3.4\"}, {\"status\": \"affected\", \"version\": \"2.3.5\"}, {\"status\": \"affected\", \"version\": \"2.3.6\"}, {\"status\": \"affected\", \"version\": \"2.3.7\"}, {\"status\": \"affected\", \"version\": \"2.3.8\"}, {\"status\": \"affected\", \"version\": \"2.3.9\"}, {\"status\": \"affected\", \"version\": \"2.3.10\"}, {\"status\": \"affected\", \"version\": \"2.3.11\"}, {\"status\": \"affected\", \"version\": \"2.3.12\"}, {\"status\": \"unaffected\", \"version\": \"2.3.13\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-08-30T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-08-30T02:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-08-30T15:45:07.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.322014\", \"name\": \"VDB-322014 | Cudy LT500E Web shadow hard-coded password\", \"tags\": [\"vdb-entry\"]}, {\"url\": \"https://vuldb.com/?ctiid.322014\", \"name\": \"VDB-322014 | CTI Indicators (IOB, IOC, TTP, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.639346\", \"name\": \"Submit #639346 | Cudy Cudy LT500E 1.0 Router LT500E-R42-2.3.13 Insecure Storage of Sensitive Information\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md\", \"tags\": [\"related\"]}, {\"url\": \"https://github.com/XXRicardo/iot-cve/blob/main/CUDY/LT500E-R42-2.3.13.md#steps-to-reproduce\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was identified in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password. The attack must be carried out locally. The attack\u0027s complexity is rated as high. The exploitability is told to be difficult. The exploit is publicly available and might be used. Upgrading to version 2.3.13 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: \\\"[T]he firmware does store a default password of \u0027admin\u0027. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page.\\\"\"}, {\"lang\": \"de\", \"value\": \"In Cudy LT500E bis 2.3.12 wurde eine Schwachstelle gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /squashfs-root/etc/shadow der Komponente Web Interface. Dank der Manipulation mit unbekannten Daten kann eine use of hard-coded password-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Das Durchf\\u00fchren eines Angriffs ist mit einer relativ hohen Komplexit\\u00e4t verbunden. Die Ausnutzung wird als schwierig beschrieben. Die Ausnutzung wurde ver\\u00f6ffentlicht und kann verwendet werden. Ein Aktualisieren auf die Version 2.3.13 vermag dieses Problem zu l\\u00f6sen. Die Aktualisierung der betroffenen Komponente wird empfohlen.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-259\", \"description\": \"Use of Hard-coded Password\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-255\", \"description\": \"Credentials Management\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-08-31T10:02:06.702Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-9725\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-02T15:15:41.108Z\", \"dateReserved\": \"2025-08-30T13:40:00.256Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-08-31T10:02:06.702Z\", \"assignerShortName\": \"VulDB\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…