{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-8731","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-08T07:45:03.332Z","datePublished":"2025-08-08T15:32:05.773Z","dateUpdated":"2025-08-13T08:18:21.779Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-13T08:18:21.779Z"},"title":"TRENDnet TI-G160i/TI-PG102i/TPL-430AP SSH Service default credentials","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1392","lang":"en","description":"Use of Default Credentials"}]}],"affected":[{"vendor":"TRENDnet","product":"TI-G160i","versions":[{"version":"20250724","status":"affected"}],"modules":["SSH Service"]},{"vendor":"TRENDnet","product":"TI-PG102i","versions":[{"version":"20250724","status":"affected"}],"modules":["SSH Service"]},{"vendor":"TRENDnet","product":"TPL-430AP","versions":[{"version":"20250724","status":"affected"}],"modules":["SSH Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: \"For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid.\""},{"lang":"de","value":"Es geht dabei um eine nicht klar definierte Funktion der Komponente SSH Service. Durch das Manipulieren mit unbekannten Daten kann eine use of default credentials-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. Die wahre Existenz der vermeintlichen Schwachstelle wird zur Zeit in Frage gestellt."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-08T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-13T10:23:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nich0las (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.319227","name":"VDB-319227 | TRENDnet TI-G160i/TI-PG102i/TPL-430AP SSH Service default credentials","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.319227","name":"VDB-319227 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.621749","name":"Submit #621749 | trendnet TI-G160i,TI-PG102i,TPL-430AP TI-G160i with version v1_1.0.5.S0,TI-PG102i with version v1_1.0.11, v1_1.0.13 and v1_1.0.15,TPL-430AP with version 1.0.1 Use of Default Credentials","tags":["third-party-advisory"]},{"url":"https://github.com/Nicholas-wei/bug-discovery/blob/main/trendnet/TPL-430AP_FW1.0.1/trendnet_several_vulns.pdf","tags":["exploit"]}],"tags":["disputed"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-08T16:04:22.541132Z","id":"CVE-2025-8731","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-08T16:04:34.364Z"}}]}}