Plataforma
other
Componente
quantenna-wi-fi-chipset
Corrigido em
8.0.1
CVE-2025-3461 describes a critical vulnerability affecting Quantenna Wi-Fi chipsets. The vulnerability stems from a default, unauthenticated Telnet interface, enabling unauthorized access to the device. This flaw impacts versions 0 through 8.0.0.28 of the Quantenna SDK and has been addressed with the release of version 8.0.1.
The presence of an unauthenticated Telnet interface presents a significant security risk. An attacker could leverage this vulnerability to gain complete control over the affected Wi-Fi chipset, potentially leading to data breaches, network disruption, and unauthorized configuration changes. The lack of authentication means no credentials are required to access the Telnet interface, making it easily exploitable. This vulnerability is analogous to exposing administrative interfaces without proper security controls, allowing attackers to bypass standard access restrictions.
CVE-2025-3461 was published on 2025-06-08. There is no indication of active exploitation at this time, and no public proof-of-concept (PoC) code has been released. The vulnerability is listed on the CISA KEV catalog with a severity assessment pending. The vendor has released a best practices guide, suggesting awareness of the issue within the industry.
Devices utilizing Quantenna Wi-Fi chipsets in their firmware, particularly those running versions 0 through 8.0.0.28, are at risk. This includes a wide range of consumer and enterprise devices, such as routers, access points, and embedded systems. Shared hosting environments utilizing these chipsets are also particularly vulnerable due to the potential for widespread impact.
disclosure
Status do Exploit
EPSS
0.10% (percentil 27%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-3461 is to upgrade the Quantenna Wi-Fi chipset SDK to version 8.0.1 or later. This version includes the necessary fixes to disable the unauthenticated Telnet interface. If an immediate upgrade is not feasible, consider implementing network segmentation to isolate the affected chipsets from critical resources. Additionally, firewalls can be configured to block Telnet traffic (port 23) to these devices. While a temporary workaround, this does not fully eliminate the risk. Consult the vendor's best practices guide for implementors of this chipset for further hardening recommendations.
Deshabilitar o autenticar el acceso Telnet. Consultar la guía de mejores prácticas de ON Semiconductor para la implementación del chipset Quantenna Wi-Fi. Implementar las medidas de seguridad recomendadas para mitigar la vulnerabilidad.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-3461 is a critical vulnerability affecting Quantenna Wi-Fi chipsets, allowing unauthorized access via an unauthenticated Telnet interface.
If your device uses a Quantenna Wi-Fi chipset running versions 0 through 8.0.0.28, you are potentially affected by this vulnerability.
Upgrade the Quantenna Wi-Fi chipset SDK to version 8.0.1 or later to disable the unauthenticated Telnet interface.
There is currently no indication of active exploitation or publicly available proof-of-concept code.
Consult the vendor's best practices guide for implementors of this chipset, available through Quantenna's support channels.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.