{"id":55889,"date":"2025-06-29T01:27:03","date_gmt":"2025-06-29T01:27:03","guid":{"rendered":""},"modified":"2025-09-14T10:02:30","modified_gmt":"2025-09-14T16:02:30","slug":"cve-2025-6529-critical-vulnerability-in-70mai-m300-exploiting-default-telnet-credentials","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-6529-critical-vulnerability-in-70mai-m300-exploiting-default-telnet-credentials\/","title":{"rendered":"<strong>CVE-2025-6529: Critical Vulnerability in 70mai M300 Exploiting Default Telnet Credentials<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A critical vulnerability has been discovered in 70mai M300 up to version 20250611, affecting components of its Telnet service. This vulnerability is potentially hazardous to any organization using the affected versions of this product, as it opens up the potential for system compromise and data leakage. This vulnerability is particularly concerning as it has been disclosed to the public and thus, malicious actors may be aware of and actively exploiting this weakness.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-6529<br \/>\nSeverity: Critical (8.8 CVSS score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5866-critical-vulnerability-in-rt-thread-5-1-0-potentially-leading-to-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"63832\">System compromise or data<\/a> leakage due to use of default credentials in Telnet service<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2354826396\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>70mai M300 | Up to 20250611<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-45347-unauthorized-access-vulnerability-in-xiaomi-mi-connect-service-app\/\"  data-wpil-monitor-id=\"63584\">vulnerability arises from the Telnet service<\/a> within the 70mai M300 product. This service, intended for remote administration of the device, is configured with <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8731-default-credentials-vulnerability-in-trendnet-devices\/\"  data-wpil-monitor-id=\"82271\">default credentials<\/a>, which are not enforced to be changed upon installation or setup. As such, an attacker who gains network <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49154-insecure-access-control-vulnerability-in-trend-micro-products\/\"  data-wpil-monitor-id=\"62734\">access can simply use these default credentials to gain control<\/a> of the device. This manipulation allows for an unauthorized user to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49415-path-traversal-vulnerability-in-fw-gallery-with-potential-for-system-compromise\/\"  data-wpil-monitor-id=\"62735\">potentially compromise the system<\/a> and leak sensitive data.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-276623289\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here&#8217;s a conceptual example of how an attacker might exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50201-critical-os-command-injection-vulnerability-in-wegia-web-manager\/\"  data-wpil-monitor-id=\"62896\">vulnerability via a simple Telnet command:<\/a><\/p>\n<pre><code class=\"\" data-line=\"\">telnet target_device_ip\nTrying target_device_ip...\nConnected to target_device_ip.\nEscape character is &#039;^]&#039;.\nlogin: default_username\npassword: default_password\n# Now the attacker has control over the device<\/code><\/pre>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>The primary mitigation for this vulnerability is to apply the vendor-provided patch when it becomes available. In the absence of an immediate patch, it is recommended to use Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) as temporary measures to detect and prevent possible attacks. Furthermore, if possible, the default credentials should be changed immediately to prevent <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5071-unauthorized-access-and-data-modification-vulnerability-in-ai-engine-wordpress-plugin\/\"  data-wpil-monitor-id=\"62846\">unauthorized access<\/a>.<br \/>\nIn the meantime, users are encouraged to monitor their systems for any signs of suspicious activity, and to remain vigilant about updates from the vendor regarding this issue. It is also advisable to isolate the affected devices from the network, or place them behind a firewall until the patch is applied.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A critical vulnerability has been discovered in 70mai M300 up to version 20250611, affecting components of its Telnet service. This vulnerability is potentially hazardous to any organization using the affected versions of this product, as it opens up the potential for system compromise and data leakage. This vulnerability is particularly concerning as it has [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-55889","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/55889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=55889"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/55889\/revisions"}],"predecessor-version":[{"id":74782,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/55889\/revisions\/74782"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=55889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=55889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=55889"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=55889"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=55889"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=55889"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=55889"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=55889"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=55889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}