Cyber Posture

CVE-2025-1143

High

Published: 11 February 2025

Published
11 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1143 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Org (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique SSH (T1021.004); ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to SSH (T1021.004) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires managing and changing default authenticators, preventing the use of hard-coded credentials for SSH access.

prevent

Ensures proper account management including disabling unnecessary accounts and changing default credentials to block unauthorized root logins.

prevent

Mandates identification, reporting, and correction of flaws like hard-coded credentials through timely patching and firmware updates.

MITRE ATT&CK Enterprise TechniquesAI

T1021.004 SSH Lateral Movement
Adversaries may use [Valid Accounts](https://attack.
T1078.003 Local Accounts Stealth
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1133 External Remote Services Persistence
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
Why these techniques?

Hard-coded credentials directly enable root login via exposed SSH (T1021.004), use of valid local accounts (T1078.003), and external remote services access (T1133).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Certain models of routers from Billion Electric has hard-coded embedded linux credentials, allowing attackers to log in through the SSH service using these credentials and obtain root privilege of the system.

Deeper analysisAI

CVE-2025-1143 is a vulnerability in certain models of routers from Billion Electric that involves hard-coded embedded Linux credentials. These credentials enable unauthorized access through the SSH service, allowing attackers to log in and obtain root privileges on the affected systems. Published on 2025-02-11, the issue has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-798 (Use of Hard-coded Credentials).

The attack requires local access (AV:L) with low complexity and no privileges (PR:N). An attacker can exploit it by connecting to the exposed SSH service using the hard-coded credentials, achieving root-level control. This results in high impacts on confidentiality, integrity, and availability, potentially leading to full compromise of the router.

Mitigation details are available in advisories from TWCERT, including https://www.twcert.org.tw/en/cp-139-8414-096ce-2.html and https://www.twcert.org.tw/tw/cp-132-8413-ec9a5-1.html.

Details

CWE(s)

Affected Products

Org
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-35451Shared CWE-798
CVE-2025-30123Shared CWE-798
CVE-2024-57811Shared CWE-798
CVE-2024-11147Shared CWE-798
CVE-2026-23647Shared CWE-798
CVE-2025-14115Shared CWE-798
CVE-2026-26334Shared CWE-798
CVE-2025-30137Shared CWE-798
CVE-2026-28777Shared CWE-798
CVE-2026-27507Shared CWE-798

References