TRENDnet TI-G160i/TI-PG102i/TPL-430AP up to 20250724 SSH Service default credentials ⚔ [Disputed]

Summaryinfo

A vulnerability classified as critical has been found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. The impacted element is an unknown function of the component SSH Service. Performing a manipulation results in default credentials. This vulnerability is reported as CVE-2025-8731. The attack is possible to be carried out remotely. Moreover, an exploit is present. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid."

Detailsinfo

A vulnerability was found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. It has been classified as critical. This affects some unknown processing of the component SSH Service. The manipulation with an unknown input leads to a default credentials vulnerability. CWE is classifying the issue as CWE-1392. The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. This is going to have an impact on confidentiality, integrity, and availability.

It is possible to read the advisory at github.com. This vulnerability is uniquely identified as CVE-2025-8731. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available.

The exploit is shared for download at github.com. It is declared as proof-of-concept. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid."

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-23997). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Productinfo

Vendor

Name

Version

License

CPE 2.3info

CPE 2.2info

CVSSv4info

VulDB Vector: 🔒
VulDB Reliability: 🔍

CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Vector: 🔒

CVSSv3info

VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.4

VulDB Base Score: 9.8
VulDB Temp Score: 8.9
VulDB Vector: 🔒
VulDB Reliability: 🔍

CNA Base Score: 9.8
CNA Vector: 🔒

CVSSv2info

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VectorComplexityAuthenticationConfidentialityIntegrityAvailability
UnlockUnlockUnlockUnlockUnlockUnlock
UnlockUnlockUnlockUnlockUnlockUnlock
UnlockUnlockUnlockUnlockUnlockUnlock

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍

Exploitinginfo

Class: Default credentials
CWE: CWE-1392
CAPEC: 🔒
ATT&CK: 🔒

Physical: No
Local: No
Remote: Yes

Availability: 🔒
Access: Public
Status: Proof-of-Concept
Download: 🔒

EPSS Score: 🔒
EPSS Percentile: 🔒

Price Prediction: 🔍
Current Price Estimation: 🔒

0-DayUnlockUnlockUnlockUnlock
TodayUnlockUnlockUnlockUnlock

Threat Intelligenceinfo

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍

Countermeasuresinfo

Recommended: no mitigation known
Status: 🔍

0-Day Time: 🔒

Timelineinfo

08/08/2025 Advisory disclosed
08/08/2025 +0 days VulDB entry created
08/13/2025 +5 days VulDB entry last update

Sourcesinfo

Advisory: github.com
Status: Not defined
Disputed: 🔍

CVE: CVE-2025-8731 (🔒)
GCVE (CVE): GCVE-0-2025-8731
GCVE (VulDB): GCVE-100-319227
EUVD: 🔒
scip Labs: https://www.scip.ch/en/?labs.20161013

Entryinfo

Created: 08/08/2025 09:50
Updated: 08/13/2025 11:31
Changes: 08/08/2025 09:50 (55), 08/09/2025 02:56 (31), 08/13/2025 10:22 (1), 08/13/2025 10:23 (2), 08/13/2025 11:17 (1), 08/13/2025 11:31 (1)
Complete: 🔍
Submitter: nich0las
Cache ID: 216::103

Submitinfo

Accepted

  • Submit #621749: trendnet TI-G160i,TI-PG102i,TPL-430AP TI-G160i with version v1_1.0.5.S0,TI-PG102i with version v1_1.0.11, v1_1.0.13 and v1_1.0.15,TPL-430AP with version 1.0.1 Use of Default Credentials (by nich0las)

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Discussion

No comments yet. Languages: en.

Please log in to comment.

Want to know what is going to be exploited?

We predict KEV entries!