{"uuid": "c767330e-e034-4bf6-b321-566cd74f0e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46633", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14496", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46633\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt traffic between the client and server by collecting the symmetric AES key from collected and/or observed traffic. The AES key in sent in cleartext in response to successful authentication. The IV is always EU5H62G9ICGRNI43.\n\ud83d\udccf Published: 2025-05-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T14:59:18.138Z\n\ud83d\udd17 References:\n1. https://www.tendacn.com/us/default.html\n2. https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46633-transmission-of-plaintext-symmetric-key-in-httpd", "creation_timestamp": "2025-05-02T15:16:59.000000Z"}