Home

Description

A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-16 | Updated 2026-03-16 | Assigner VulDB




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R
CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R
10.0AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:UR

Problem types

Reliance on IP Address for Authentication

Improper Authentication

Product status

16.03.50.11
affected

Timeline

2026-03-16:Advisory disclosed
2026-03-16:VulDB entry created
2026-03-16:VulDB entry last update

Credits

DigitalAndrew (VulDB User) reporter

References

vuldb.com/?id.351210 (VDB-351210 | Tenda AC8 IPv6 check_is_ipv6 ip address for authentication) vdb-entry technical-description

vuldb.com/?ctiid.351210 (VDB-351210 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.771759 (Submit #771759 | Tenda AC8 V5 V16.03.50.11 Authentication Bypass Issues) third-party-advisory

github.com/...tenda_ac8_v5/blob/main/poc_ipv6_auth_bypass.py exploit

www.tenda.com.cn/ product

cve.org (CVE-2026-4252)

nvd.nist.gov (CVE-2026-4252)

Download JSON