Cyber Posture

CVE-2025-26010

Critical

Published: 26 March 2025

Published
26 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0034 56.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26010 is a critical-severity Improper Access Control (CWE-284) vulnerability in Telesquare Tlr-2005Ksh Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-2 (Account Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to sensitive functions like setUserNamePassword in admin.cgi, directly preventing unauthorized password modifications.

prevent

Limits and authorizes specific actions performable without identification or authentication, prohibiting unauthenticated password changes.

prevent

Establishes managed processes for account and authenticator changes, requiring approvals to block unauthorized administrative password modifications.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote unauthenticated exploit in the router's public-facing web admin interface (admin.cgi/setUserNamePassword) that bypasses access controls to modify passwords and gain full device control, directly mapping to exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Telesquare TLR-2005KSH 1.1.4 allows unauthorized password modification when requesting the admin.cgi parameter with setUserNamePassword.

Deeper analysisAI

CVE-2025-26010 affects the Telesquare TLR-2005KSH router running version 1.1.4. The vulnerability enables unauthorized password modification through a request to the admin.cgi parameter using the setUserNamePassword function, bypassing proper access controls. Classified under CWE-284 (Improper Access Control), it received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) upon publication on 2025-03-26.

The flaw is exploitable by unauthenticated remote attackers with network access, requiring low complexity and no user interaction. Exploitation allows modification of administrative passwords, resulting in high-impact compromise of confidentiality, integrity, and availability, potentially granting full control over the affected device.

Mitigation details are available in the referenced advisory at https://github.com/Fan-24/Digging/blob/main/9/1.md.

Details

CWE(s)

Affected Products

telesquare
tlr-2005ksh firmware
1.1.4

CVEs Like This One

CVE-2025-26004Same product: Telesquare Tlr-2005Ksh
CVE-2025-26007Same product: Telesquare Tlr-2005Ksh
CVE-2025-26006Same product: Telesquare Tlr-2005Ksh
CVE-2025-26005Same product: Telesquare Tlr-2005Ksh
CVE-2025-26008Same product: Telesquare Tlr-2005Ksh
CVE-2025-26011Same product: Telesquare Tlr-2005Ksh
CVE-2025-26002Same product: Telesquare Tlr-2005Ksh
CVE-2025-26003Same product: Telesquare Tlr-2005Ksh
CVE-2025-26001Same product: Telesquare Tlr-2005Ksh
CVE-2025-28361Same product: Telesquare Tlr-2005Ksh

References