A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/QIU-DIE/CVE/issues/49 | Broken Link Issue Tracking |
| https://vuldb.com/?ctiid.343378 | Permissions Required VDB Entry |
| https://vuldb.com/?id.343378 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.740766 | Third Party Advisory VDB Entry |
| https://www.tenda.com.cn/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
27 Feb 2026, 13:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/QIU-DIE/CVE/issues/49 - Broken Link, Issue Tracking | |
| References | () https://vuldb.com/?ctiid.343378 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.343378 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.740766 - Third Party Advisory, VDB Entry | |
| References | () https://www.tenda.com.cn/ - Product | |
| CPE | cpe:2.3:h:tenda:ax12_pro:2.0:*:*:*:*:*:*:* cpe:2.3:o:tenda:ax12_pro_firmware:16.03.49.24_cn:*:*:*:*:*:*:* |
|
| First Time |
Tenda
Tenda ax12 Pro Tenda ax12 Pro Firmware |
29 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-29 19:16
Updated : 2026-02-27 13:56
NVD link : CVE-2026-1610
Mitre link : CVE-2026-1610
CVE.ORG link : CVE-2026-1610
JSON object : View
Products Affected
tenda
- ax12_pro_firmware
- ax12_pro
