CVE-2025-3461

CRITICAL
Published Jun 8, 2025 Modified Jan 13, 2026 CWE-306

Description

The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

CVSS v3.1 Score

9.1
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Weakness Type (CWE)

CWE-306 Missing Authentication

Affected Products

Vendor Product
onsemi qhs710_firmware
onsemi qhs710
onsemi qsr10ga_firmware
onsemi qsr10ga
onsemi qsr10gu_firmware
onsemi qsr10gu
onsemi qv840_firmware
onsemi qv840
onsemi qv840c_firmware
onsemi qv840c
onsemi qv860_firmware
onsemi qv860
onsemi qv940_firmware
onsemi qv940
onsemi qv942c_firmware
onsemi qv942c
onsemi qv952c_firmware
onsemi qv952c
onsemi qcs-ax2-s5_firmware
onsemi qcs-ax2-s5
onsemi qcs-ax3-a12_firmware
onsemi qcs-ax3-a12
onsemi qcs-ax3-t12_firmware
onsemi qcs-ax3-t12
onsemi qcs-ax3-t8_firmware
onsemi qcs-ax3-t8
onsemi qcs-ax3-s5_firmware
onsemi qcs-ax3-s5
onsemi qcs-ax2-a12_firmware
onsemi qcs-ax2-a12
onsemi qcs-ax2-t12_firmware
onsemi qcs-ax2-t12
onsemi qcs-ax2-t8_firmware
onsemi qcs-ax2-t8
onsemi qd840_firmware
onsemi qd840

References

Frequently Asked Questions

What is CVE-2025-3461? +
The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset. It has a CVSS v3.1 base score of 9.1 (CRITICAL).
How severe is CVE-2025-3461? +
CVE-2025-3461 has a CVSS v3.1 score of 9.1 out of 10, rated CRITICAL. This is a critical vulnerability that should be patched immediately.
What products are affected by CVE-2025-3461? +
CVE-2025-3461 affects products from onsemi, specifically: qcs-ax2-a12, qcs-ax2-a12_firmware, qcs-ax2-s5, qcs-ax2-s5_firmware, qcs-ax2-t12, qcs-ax2-t12_firmware, qcs-ax2-t8, qcs-ax2-t8_firmware, qcs-ax3-a12, qcs-ax3-a12_firmware, qcs-ax3-s5, qcs-ax3-s5_firmware, qcs-ax3-t12, qcs-ax3-t12_firmware, qcs-ax3-t8, qcs-ax3-t8_firmware, qd840, qd840_firmware, qhs710, qhs710_firmware, qsr10ga, qsr10ga_firmware, qsr10gu, qsr10gu_firmware, qv840, qv840_firmware, qv840c, qv840c_firmware, qv860, qv860_firmware, qv940, qv940_firmware, qv942c, qv942c_firmware, qv952c, qv952c_firmware. Check the affected products table above for specific version ranges.
How do I check if I'm vulnerable to CVE-2025-3461? +
You can use Secably's free Website Scanner to check your website for known vulnerabilities. For infrastructure scanning, use the Port Scanner to identify exposed services that may be affected. Check the vendor advisories linked above for specific patch and version information.

Related Vulnerabilities

Don't wait for an exploit

Scan your website for vulnerabilities like CVE-2025-3461 — free, no signup required.

Start Free Scan