Description
A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Published: 2026-03-16
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from the check_is_ipv6 function in the IPv6 Handler of the Tenda AC8 firmware. The implementation improperly relies on the client’s IPv6 address to satisfy authentication conditions, allowing an attacker to bypass normal credential checks. Consequently, an attacker who successfully bypasses authentication could gain administrative access to the router’s web interface, potentially compromising the confidentiality, integrity, and availability of the network. The weakness corresponds to authentication bypass (CWE‑287) and improper authorization (CWE‑291).

Affected Systems

Devices affected by this defect are Tenda AC8 routers running firmware version 16.03.50.11. The CPE entries indicate that the firmware product and the hardware model are susceptible. No other product versions or vendors are listed, so only current AC8 devices with the specified firmware are at risk.

Risk and Exploitability

The assigned CVSS score of 9.3 denotes critical severity. The EPSS score is below 1% , implying that large‑scale exploitation is unlikely at present, yet a publicly available proof‑of‑concept on GitHub demonstrates that the exploit is reachable. Based on the description, the exploit can be launched remotely through the router’s management interface; it does not require physical access. As the flaw is not listed in the CISA KEV catalog, no mass‑distribution is recorded, but the risk remains high because successful authentication bypass directly grants privileged control over the device.

Generated by OpenCVE AI on April 3, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router’s firmware to a version that addresses the IPv6 authentication bypass, downloading the latest release from Tenda’s official website.
  • After installing the update, reboot the device and verify that login no longer accepts IP‑based authentication shortcuts.
  • If a firmware update is unavailable, disable IPv6 on the router or block IPv6 traffic to the router’s management interface through your network firewall, thereby limiting the attack vector.
  • Monitor management interface logs for suspicious login attempts and review audit trails after mitigation.

Generated by OpenCVE AI on April 3, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac8_firmware:16.03.50.11:*:*:*:*:*:*:*

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac8
Vendors & Products Tenda ac8

Mon, 16 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Title Tenda AC8 IPv6 check_is_ipv6 ip address for authentication
First Time appeared Tenda
Tenda ac8 Firmware
Weaknesses CWE-287
CWE-291
CPEs cpe:2.3:o:tenda:ac8_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac8 Firmware
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T18:07:41.022Z

Reserved: 2026-03-16T06:16:02.051Z

Link: CVE-2026-4252

cve-icon Vulnrichment

Updated: 2026-03-16T18:07:36.228Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T17:16:32.057

Modified: 2026-04-03T19:39:21.993

Link: CVE-2026-4252

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:09:05Z

Weaknesses