Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1610: Hard-coded Credentials in Tenda AX12 Pro V2

0
Critical
VulnerabilityCVE-2026-1610cvecve-2026-1610
Published: Thu Jan 29 2026 (01/29/2026, 19:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Tenda
Product: AX12 Pro V2

Description

CVE-2026-1610 is a critical vulnerability in the Tenda AX12 Pro V2 router firmware version 16. 03. 49. 24_cn involving hard-coded credentials in the Telnet service. This flaw allows remote attackers to potentially gain unauthorized access without authentication, exploiting embedded credentials that cannot be changed. Although the attack complexity is high and exploitation is difficult, the vulnerability impacts confidentiality, integrity, and availability severely. No user interaction is required, and the vulnerability does not require prior privileges. The exploit code has been publicly disclosed but no widespread exploitation is currently reported. European organizations using this router model are at risk, especially in countries with significant Tenda market presence or strategic infrastructure relying on these devices. Mitigation requires firmware updates from the vendor or disabling Telnet access if possible.

AI-Powered Analysis

AILast updated: 01/29/2026, 19:27:09 UTC

Technical Analysis

CVE-2026-1610 identifies a critical security vulnerability in the Tenda AX12 Pro V2 router firmware version 16.03.49.24_cn, specifically within the Telnet service component. The vulnerability arises from the presence of hard-coded credentials embedded in the firmware, which attackers can exploit remotely without requiring authentication or user interaction. These credentials provide unauthorized access to the device, potentially allowing attackers to execute arbitrary commands, manipulate device configurations, or pivot into internal networks. The attack complexity is rated high, indicating that exploitation requires advanced skills or specific conditions, and no known widespread exploitation has been observed yet. The vulnerability affects confidentiality, integrity, and availability of affected devices, as attackers can intercept or alter network traffic, disrupt services, or compromise connected systems. The CVSS 4.0 base score of 9.2 reflects the critical nature of this flaw, with attack vector being network-based and no privileges or user interaction needed. The vulnerability does not require scope changes or authentication, increasing its risk profile. The public disclosure of exploit code raises the risk of future attacks. Given the widespread use of Tenda routers in consumer and small business environments, this vulnerability poses a significant threat, especially where devices are exposed to untrusted networks or lack proper segmentation. The absence of an official patch at the time of disclosure necessitates immediate mitigation steps to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2026-1610 can be substantial. Compromise of Tenda AX12 Pro V2 routers could lead to unauthorized network access, data interception, and manipulation, potentially affecting sensitive communications and business operations. The vulnerability undermines network perimeter security, enabling attackers to bypass authentication controls and gain persistent footholds. This can facilitate lateral movement within corporate networks, data exfiltration, or disruption of critical services. Small and medium enterprises relying on these routers for internet connectivity or VPN termination are particularly vulnerable. Additionally, critical infrastructure sectors such as energy, healthcare, and finance that utilize these devices could face operational disruptions or data breaches. The public availability of exploit code increases the likelihood of targeted attacks or opportunistic scanning by cybercriminals. The high attack complexity somewhat limits mass exploitation but does not eliminate risk to well-resourced adversaries or skilled attackers. Overall, the vulnerability threatens confidentiality, integrity, and availability of network communications and connected systems within European organizations.

Mitigation Recommendations

1. Immediately check if Tenda AX12 Pro V2 routers running firmware version 16.03.49.24_cn are deployed within the network and isolate them if possible. 2. Disable the Telnet service on affected devices to eliminate the attack vector, if the device management allows. 3. Monitor network traffic for unusual Telnet connection attempts or unauthorized access patterns. 4. Implement network segmentation to restrict access to router management interfaces from untrusted or external networks. 5. Apply strict firewall rules to block inbound Telnet (TCP port 23) traffic from outside trusted zones. 6. Regularly audit device firmware versions and configurations to identify vulnerable devices. 7. Engage with Tenda support or vendors for firmware updates or patches addressing this vulnerability as soon as they become available. 8. Consider replacing vulnerable devices with models that do not have known hard-coded credential issues. 9. Educate IT staff about the risks of hard-coded credentials and the importance of disabling legacy protocols like Telnet. 10. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T12:32:02.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697bb130ac06320222ae6e7f

Added to database: 1/29/2026, 7:12:48 PM

Last enriched: 1/29/2026, 7:27:09 PM

Last updated: 1/29/2026, 8:15:54 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats