Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/Remenis/CVE-2025-63666 |
|
History
Mon, 17 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac15 Firmware
|
|
| CPEs | cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda ac15 Firmware
|
Thu, 13 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Wed, 12 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac15 |
|
| Vendors & Products |
Tenda
Tenda ac15 |
Wed, 12 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-12T00:00:00.000Z
Updated: 2025-11-18T14:33:15.572Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63666
Updated: 2025-11-13T15:53:50.031Z
Status : Analyzed
Published: 2025-11-12T15:15:38.583
Modified: 2025-11-17T18:59:20.080
Link: CVE-2025-63666
No data.