CVE-2026-1610: Hard-coded Credentials in Tenda AX12 Pro V2
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2026-1610 identifies a critical security vulnerability in the Tenda AX12 Pro V2 router firmware version 16.03.49.24_cn, specifically within the Telnet service component. The vulnerability arises from the presence of hard-coded credentials embedded in the firmware, which attackers can exploit remotely without requiring authentication or user interaction. These credentials provide unauthorized access to the device, potentially allowing attackers to execute arbitrary commands, manipulate device configurations, or pivot into internal networks. The attack complexity is rated high, indicating that exploitation requires advanced skills or specific conditions, and no known widespread exploitation has been observed yet. The vulnerability affects confidentiality, integrity, and availability of affected devices, as attackers can intercept or alter network traffic, disrupt services, or compromise connected systems. The CVSS 4.0 base score of 9.2 reflects the critical nature of this flaw, with attack vector being network-based and no privileges or user interaction needed. The vulnerability does not require scope changes or authentication, increasing its risk profile. The public disclosure of exploit code raises the risk of future attacks. Given the widespread use of Tenda routers in consumer and small business environments, this vulnerability poses a significant threat, especially where devices are exposed to untrusted networks or lack proper segmentation. The absence of an official patch at the time of disclosure necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2026-1610 can be substantial. Compromise of Tenda AX12 Pro V2 routers could lead to unauthorized network access, data interception, and manipulation, potentially affecting sensitive communications and business operations. The vulnerability undermines network perimeter security, enabling attackers to bypass authentication controls and gain persistent footholds. This can facilitate lateral movement within corporate networks, data exfiltration, or disruption of critical services. Small and medium enterprises relying on these routers for internet connectivity or VPN termination are particularly vulnerable. Additionally, critical infrastructure sectors such as energy, healthcare, and finance that utilize these devices could face operational disruptions or data breaches. The public availability of exploit code increases the likelihood of targeted attacks or opportunistic scanning by cybercriminals. The high attack complexity somewhat limits mass exploitation but does not eliminate risk to well-resourced adversaries or skilled attackers. Overall, the vulnerability threatens confidentiality, integrity, and availability of network communications and connected systems within European organizations.
Mitigation Recommendations
1. Immediately check if Tenda AX12 Pro V2 routers running firmware version 16.03.49.24_cn are deployed within the network and isolate them if possible. 2. Disable the Telnet service on affected devices to eliminate the attack vector, if the device management allows. 3. Monitor network traffic for unusual Telnet connection attempts or unauthorized access patterns. 4. Implement network segmentation to restrict access to router management interfaces from untrusted or external networks. 5. Apply strict firewall rules to block inbound Telnet (TCP port 23) traffic from outside trusted zones. 6. Regularly audit device firmware versions and configurations to identify vulnerable devices. 7. Engage with Tenda support or vendors for firmware updates or patches addressing this vulnerability as soon as they become available. 8. Consider replacing vulnerable devices with models that do not have known hard-coded credential issues. 9. Educate IT staff about the risks of hard-coded credentials and the importance of disabling legacy protocols like Telnet. 10. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom
CVE-2026-1610: Hard-coded Credentials in Tenda AX12 Pro V2
Description
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-1610 identifies a critical security vulnerability in the Tenda AX12 Pro V2 router firmware version 16.03.49.24_cn, specifically within the Telnet service component. The vulnerability arises from the presence of hard-coded credentials embedded in the firmware, which attackers can exploit remotely without requiring authentication or user interaction. These credentials provide unauthorized access to the device, potentially allowing attackers to execute arbitrary commands, manipulate device configurations, or pivot into internal networks. The attack complexity is rated high, indicating that exploitation requires advanced skills or specific conditions, and no known widespread exploitation has been observed yet. The vulnerability affects confidentiality, integrity, and availability of affected devices, as attackers can intercept or alter network traffic, disrupt services, or compromise connected systems. The CVSS 4.0 base score of 9.2 reflects the critical nature of this flaw, with attack vector being network-based and no privileges or user interaction needed. The vulnerability does not require scope changes or authentication, increasing its risk profile. The public disclosure of exploit code raises the risk of future attacks. Given the widespread use of Tenda routers in consumer and small business environments, this vulnerability poses a significant threat, especially where devices are exposed to untrusted networks or lack proper segmentation. The absence of an official patch at the time of disclosure necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, the impact of CVE-2026-1610 can be substantial. Compromise of Tenda AX12 Pro V2 routers could lead to unauthorized network access, data interception, and manipulation, potentially affecting sensitive communications and business operations. The vulnerability undermines network perimeter security, enabling attackers to bypass authentication controls and gain persistent footholds. This can facilitate lateral movement within corporate networks, data exfiltration, or disruption of critical services. Small and medium enterprises relying on these routers for internet connectivity or VPN termination are particularly vulnerable. Additionally, critical infrastructure sectors such as energy, healthcare, and finance that utilize these devices could face operational disruptions or data breaches. The public availability of exploit code increases the likelihood of targeted attacks or opportunistic scanning by cybercriminals. The high attack complexity somewhat limits mass exploitation but does not eliminate risk to well-resourced adversaries or skilled attackers. Overall, the vulnerability threatens confidentiality, integrity, and availability of network communications and connected systems within European organizations.
Mitigation Recommendations
1. Immediately check if Tenda AX12 Pro V2 routers running firmware version 16.03.49.24_cn are deployed within the network and isolate them if possible. 2. Disable the Telnet service on affected devices to eliminate the attack vector, if the device management allows. 3. Monitor network traffic for unusual Telnet connection attempts or unauthorized access patterns. 4. Implement network segmentation to restrict access to router management interfaces from untrusted or external networks. 5. Apply strict firewall rules to block inbound Telnet (TCP port 23) traffic from outside trusted zones. 6. Regularly audit device firmware versions and configurations to identify vulnerable devices. 7. Engage with Tenda support or vendors for firmware updates or patches addressing this vulnerability as soon as they become available. 8. Consider replacing vulnerable devices with models that do not have known hard-coded credential issues. 9. Educate IT staff about the risks of hard-coded credentials and the importance of disabling legacy protocols like Telnet. 10. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-29T12:32:02.383Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697bb130ac06320222ae6e7f
Added to database: 1/29/2026, 7:12:48 PM
Last enriched: 1/29/2026, 7:27:09 PM
Last updated: 2/6/2026, 12:08:28 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumCVE-2026-2016: Stack-based Buffer Overflow in happyfish100 libfastcommon
MediumCVE-2026-2015: Improper Authorization in Portabilis i-Educar
MediumCVE-2026-2014: SQL Injection in itsourcecode Student Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.