Enviar #782053: Tenda 4G03 Pro V1.0 V04.03.01.53 Cryptographic Issuesinformación

TítuloTenda 4G03 Pro V1.0 V04.03.01.53 Cryptographic Issues
DescripciónTenda 4G03 Pro V1.0 V04.03.01.53 Hardcoded ECDSA Private Key An unencrypted ECDSA P-256 private key is embedded in plaintext at /etc/www/pem/server.key in Tenda 4G03 Pro V1.0 firmware V04.03.01.53. The firmware image is publicly downloadable from the vendor website, meaning every attacker possesses the private TLS key for every deployed device worldwide. This enables decryption of all HTTPS traffic and man-in-the-middle attacks against any device running this firmware. Additional embedded keys found include /etc/www/pem/privkey_ima.pem and /etc/www/pem/privkey_evm.pem, which compromise the device firmware integrity verification chain. Proof: Download Link: https://www.tendacn.com/us/material/show/780447530344517 File /etc/www/pem/server.key confirmed present in publicly downloadable firmware image. Key type: ECDSA P-256 unencrypted PEM format. Full key material exposed. Firmware: US_4G03ProV1.0re_V04.03.01.53_multi_TDE01.bin SHA256: 21f12b93010376d89fde1872474c88d1f1e3553df9cdb14eed231d088f959022 Download: https://www.tendacn.com/us/material/show/738332071546949 Attack: Download firmware, extract server.key, use to decrypt HTTPS sessions or MITM any deployed device. Countermeasure: Generate unique key pairs per device at manufacturing or first boot. Never embed private keys in firmware images. Store keys in protected storage inaccessible from the filesystem.
Usuario
 CoreNode (UID 96566)
Sumisión2026-03-18 03:29 (hace 19 días)
Moderación2026-04-04 08:20 (17 days later)
EstadoAceptado
Entrada de VulDB355280 [Tenda 4G03 Pro 1.0/1.0re/01.bin/04.03.01.53 ECDSA P-256 Private Key /etc/www/pem/server.key cifrado débil]
Puntos17

Want to know what is going to be exploited?

We predict KEV entries!