Description
A vulnerability was determined in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this issue is some unknown functionality of the file /webroot_ro/pem/privkeySrv.pem of the component RSA 2048-bit Private Key Handler. Executing a manipulation can lead to use of hard-coded cryptographic key
. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Use of a hard‑coded RSA private key could compromise confidentiality and integrity of communications
Action: Update firmware
AI Analysis

Impact

A flaw in Tenda AC10 router firmware 16.03.10.10_multi_TDE01 permits an attacker to manipulate the /webroot_ro/pem/privkeySrv.pem file, causing the device to use a hard‑coded 2048‑bit RSA private key. Based on the description, it is inferred that the attacker could potentially decrypt or sign traffic, thereby compromising data confidentiality and integrity. This usage violates cryptographic best practices and could lead to unauthorized control over secure communications to and from the device.

Affected Systems

The vulnerability affects all Tenda AC10 routers running firmware 16.03.10.10_multi_TDE01. No other firmware revisions are listed as impacted; therefore, devices with older or newer firmware versions are not known to be affected.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. EPSS is unavailable and the issue is not recorded in CISA’s KEV catalog. The description states that the attack can be launched remotely and an exploit has been publicly disclosed. Based on the description, it is inferred that the attack does not require privileged local access, meaning that a remote attacker could potentially exploit the flaw with limited or no authentication.

Generated by OpenCVE AI on April 5, 2026 at 11:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by Tenda that removes the hard‑coded key
  • If no patch is available, limit access to the router’s management interfaces by configuring firewall rules or placing the router behind a trusted gateway
  • Monitor the device for unexpected cryptographic activity or repeated attempts to access /webroot_ro/pem/privkeySrv.pem
  • Consider isolating the router from critical network segments or applying network segmentation to reduce exposure

Generated by OpenCVE AI on April 5, 2026 at 11:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ac10
Vendors & Products Tenda ac10

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this issue is some unknown functionality of the file /webroot_ro/pem/privkeySrv.pem of the component RSA 2048-bit Private Key Handler. Executing a manipulation can lead to use of hard-coded cryptographic key . The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda AC10 RSA 2048-bit Private Key privkeySrv.pem hard-coded key
First Time appeared Tenda
Tenda ac10 Firmware
Weaknesses CWE-320
CWE-321
CPEs cpe:2.3:o:tenda:ac10_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ac10 Firmware
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ac10 Ac10 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T16:21:09.043Z

Reserved: 2026-04-04T13:28:08.788Z

Link: CVE-2026-5549

cve-icon Vulnrichment

Updated: 2026-04-06T16:21:04.726Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T08:16:24.863

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5549

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:05Z

Weaknesses