Untriaged
Permalink
CVE-2026-4252
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Tenda AC8 IPv6 check_is_ipv6 ip address for authentication
A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
References
- https://github.com/digitalandrew/tenda_ac8_v5/blob/main/poc_ipv6_auth_bypass.py exploit
- https://www.tenda.com.cn/ product
- VDB-351210 | Tenda AC8 IPv6 check_is_ipv6 ip address for authentication vdb-entry technical-description
- VDB-351210 | CTI Indicators (IOB, IOC, IOA) signature permissions-required
- Submit #771759 | Tenda AC8 V5 V16.03.50.11 Authentication Bypass Issues third-party-advisory
Affected products
AC8
- ==16.03.50.11
Matching in nixpkgs
pkgs.spotify
Play music from the Spotify music service
-
nixos-unstable 1.2.82.428.g0ac8be2b
- nixpkgs-unstable 1.2.82.428.g0ac8be2b
- nixos-unstable-small 1.2.82.428.g0ac8be2b
pkgs.vimPlugins.nvim-treesitter-parsers.strace
Tree-sitter grammar for strace
-
nixos-unstable 0.0.0+rev=ac874dd
- nixpkgs-unstable 0.0.0+rev=ac874dd
- nixos-unstable-small 0.0.0+rev=ac874dd
Package maintainers
-
@ftrvxmtrx Sigrid Solveig Haflínudóttir <ftrvxmtrx@gmail.com>
-
@Ma27 Maximilian Bosch <maximilian@mbosch.me>
-
@timokau Timo Kaufmann <timokau@zoho.com>