Critical severity9.8NVD Advisory· Published Mar 16, 2026· Updated Apr 3, 2026
CVE-2026-4252
CVE-2026-4252
Description
A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Affected products
1- cpe:2.3:o:tenda:ac8_firmware:16.03.50.11:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/digitalandrew/tenda_ac8_v5/blob/main/poc_ipv6_auth_bypass.pynvdExploit
- vuldb.comnvdExploitThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
- www.tenda.com.cnnvdProduct
News mentions
0No linked articles in our index yet.