๐Ÿ” CVE Alert

CVE-2026-4252

CRITICAL 9.8

Tenda AC8 IPv6 check_is_ipv6 ip address for authentication

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

CWE CWE-291 CWE-287
Vendor tenda
Product ac8
Published Mar 16, 2026
Last Updated Mar 16, 2026
Stay Ahead of the Next One

Get instant alerts for tenda ac8

Be the first to know when new critical vulnerabilities affecting tenda ac8 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Tenda / AC8
16.03.50.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.351210 vuldb.com: https://vuldb.com/?ctiid.351210 vuldb.com: https://vuldb.com/?submit.771759 github.com: https://github.com/digitalandrew/tenda_ac8_v5/blob/main/poc_ipv6_auth_bypass.py tenda.com.cn: https://www.tenda.com.cn/

Credits

๐Ÿ” DigitalAndrew (VulDB User)