Description
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used.
Published: 2026-01-29
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Remote Access via hard‑coded telnet credentials
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in Tenda AX12 Pro V2’s telnet service, where valid login credentials are hard‑coded into the firmware. This allows an attacker to authenticate without knowledge of a correct password, satisfying CWE‑259 and CWE‑798. Once authenticated, the attacker gains the full privileges of the device, enabling configuration changes, firmware modifications, or use as a foothold for further network exploitation, thereby compromising confidentiality, integrity, and availability.

Affected Systems

Firmware 16.03.49.24_cn of the Tenda AX12 Pro V2 router is impacted. The vulnerability is associated with the telnet component of the device, which is enabled by default in the mentioned firmware version.

Risk and Exploitability

The CVSS base score of 9.2 classifies this issue as critical, and although the EPSS score is below 1%, the publicly available exploit script implies that a determined adversary can exploit the flaw remotely. The intruder must first discover the device, enable telnet if disabled, and then use the known credentials. Despite the high complexity, the low exploitation probability does not mitigate the critical nature of the vulnerability, and the absence from the KEV list does not reduce the urgency of remediation.

Generated by OpenCVE AI on April 18, 2026 at 01:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version that removes hard‑coded telnet credentials, ensuring the fix is applied to all units of the AX12 Pro V2.
  • If a firmware update is not immediately available, disable the telnet service on the router or restrict its access to a secured internal network segment only.
  • Configure a firewall rule to block unsolicited telnet traffic from outside the local network, and monitor the router logs for any failed login attempts from unknown IP addresses.

Generated by OpenCVE AI on April 18, 2026 at 01:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ax12 Pro
Tenda ax12 Pro Firmware
CPEs cpe:2.3:h:tenda:ax12_pro:2.0:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ax12_pro_firmware:16.03.49.24_cn:*:*:*:*:*:*:*
Vendors & Products Tenda ax12 Pro
Tenda ax12 Pro Firmware

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ax2 Pro
Vendors & Products Tenda
Tenda ax2 Pro

Thu, 29 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used.
Title Tenda AX12 Pro V2 Telnet Service hard-coded credentials
Weaknesses CWE-259
CWE-798
References
Metrics cvssV2_0

{'score': 7.6, 'vector': 'AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ax12 Pro Ax12 Pro Firmware Ax2 Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:06:50.985Z

Reserved: 2026-01-29T12:32:02.383Z

Link: CVE-2026-1610

cve-icon Vulnrichment

Updated: 2026-01-29T20:32:36.678Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T19:16:19.483

Modified: 2026-02-27T13:56:43.110

Link: CVE-2026-1610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:30:16Z

Weaknesses