{"id":76068,"date":"2025-09-22T13:27:59","date_gmt":"2025-09-22T13:27:59","guid":{"rendered":""},"modified":"2025-10-30T11:20:30","modified_gmt":"2025-10-30T17:20:30","slug":"cve-2025-57174-persistent-vulnerability-in-siklu-communications-etherhaul-devices-due-to-hardcoded-aes-encryption-keys","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-57174-persistent-vulnerability-in-siklu-communications-etherhaul-devices-due-to-hardcoded-aes-encryption-keys\/","title":{"rendered":"<strong>CVE-2025-57174: Persistent Vulnerability in Siklu Communications Etherhaul Devices Due to Hardcoded AES Encryption Keys<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>We delve into a critical vulnerability, CVE-2025-57174, that was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices. This vulnerability affects Firmware 7.4.0 through 10.7.3 and possibly other previous versions. <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9253-stack-based-buffer-overflow-on-linksys-wi-fi-range-extenders-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"84323\">Potentially exposing these devices to system<\/a> compromise or data leakage, this vulnerability has become a significant security concern in the cybersecurity landscape. Given the widespread use of these devices in various industries, the implications of this vulnerability are far-reaching, necessitating immediate attention and action.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-57174<br \/>\nSeverity: Critical (9.8 CVSS score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22404-potential-system-compromise-due-to-use-after-free-vulnerability\/\"  data-wpil-monitor-id=\"85536\">System compromise<\/a> or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3223820957\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Siklu Communications Etherhaul 8010TX | Firmware 7.4.0 through 10.7.3<br \/>\nSiklu Communications Etherhaul 1200FX | Firmware 7.4.0 through 10.7.3<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-58259-denial-of-service-vulnerability-in-rancher-manager-due-to-unrestricted-payload-size\/\"  data-wpil-monitor-id=\"85799\">vulnerability arises from the `rfpiped` service<\/a> listening on TCP port 555, which uses static AES encryption keys hardcoded into the binary. These keys are identical across all devices, making it possible for attackers to craft and send encrypted packets that <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52353-arbitrary-code-execution-vulnerability-in-badaso-cms-2-9-11\/\"  data-wpil-monitor-id=\"83987\">execute arbitrary<\/a> commands without authentication. This method of attack <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5060-authentication-bypass-vulnerability-in-bravis-user-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"85242\">bypasses the need for user<\/a> interaction and does not require any privileges, making it particularly dangerous.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4279785221\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Given the nature of this vulnerability, an attacker could exploit it by crafting an encrypted packet containing a malicious command using the hardcoded AES encryption key. Here is a conceptual example, represented in Python-like pseudocode:<\/p>\n<pre><code class=\"\" data-line=\"\">import socket\nimport AES\nTCP_IP = &#039;target_IP&#039;\nTCP_PORT = 555\nBUFFER_SIZE = 1024\n# The hardcoded AES key\nAES_KEY = &#039;hardcoded_key&#039;\ns = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\ns.connect((TCP_IP, TCP_PORT))\n# Crafting malicious command\ncommand = &#039;arbitrary_command&#039;\nencrypted_command = AES.encrypt(command, AES_KEY)\ns.send(encrypted_command)\ndata = s.recv(BUFFER_SIZE)\ns.close()\nprint(&quot;received data:&quot;, data)<\/code><\/pre>\n<p>In this example, a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-27025-high-risk-directory-traversal-vulnerability-due-to-unsecure-tcp-port-endpoint-access\/\"  data-wpil-monitor-id=\"91958\">TCP connection is established with the target device on port<\/a> 555. A command is then encrypted using the hardcoded AES key and sent to the device. The device, recognizing the key, would then decrypt and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-57771-arbitrary-command-execution-vulnerability-in-roo-code-ai\/\"  data-wpil-monitor-id=\"84846\">execute the command<\/a>, thereby compromising the system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview We delve into a critical vulnerability, CVE-2025-57174, that was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices. This vulnerability affects Firmware 7.4.0 through 10.7.3 and possibly other previous versions. Potentially exposing these devices to system compromise or data leakage, this vulnerability has become a significant security concern in the cybersecurity landscape. Given the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-76068","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/76068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=76068"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/76068\/revisions"}],"predecessor-version":[{"id":85148,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/76068\/revisions\/85148"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=76068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=76068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=76068"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=76068"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=76068"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=76068"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=76068"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=76068"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=76068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}