CVE-2026-1610

A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used.
References
Link Resource
https://github.com/QIU-DIE/CVE/issues/49 Broken Link Issue Tracking
https://vuldb.com/?ctiid.343378 Permissions Required VDB Entry
https://vuldb.com/?id.343378 Third Party Advisory VDB Entry
https://vuldb.com/?submit.740766 Third Party Advisory VDB Entry
https://www.tenda.com.cn/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ax12_pro_firmware:16.03.49.24_cn:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ax12_pro:2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-29 19:16

Updated : 2026-02-27 13:56


NVD link : CVE-2026-1610

Mitre link : CVE-2026-1610

CVE.ORG link : CVE-2026-1610


JSON object : View

Products Affected

tenda

  • ax12_pro_firmware
  • ax12_pro
CWE
CWE-259

Use of Hard-coded Password

CWE-798

Use of Hard-coded Credentials